ICRM Intelligence Collection Resource Management

Intelligence Management Simplified

AI-powered intelligence management platform built on prioritised intelligence requirements. Automated collection, analysis, and dissemination — so you always have the answers that matter.

mockup

Do you know your business's threats?

Conundrum helps you target the threats that impact your business

Do you know your threat landscape?

The landscape is constantly evolving and growing, and you cannot keep up

How do you prioritise?

Conundrum provides the Prioritised Intelligence Requirements for your business, and the answers

Breaking News — Latest Open Source Threat Intelligence

Krebs on Security 2026-05-22

Lawmakers Demand Answers as CISA Tries to Contain Data Leak

Read original →

Schneier on Security 2026-05-22

CISA Security Leak

Read original →

Unit 42 2026-05-22

Tracking Iranian APT Screening Serpens’ 2026 Espionage Campaigns

Read original →

Unit 42 2026-05-22

Tracking Iranian APT Screening Serpens’ 2026 Espionage Campaigns

Read original →

Malwarebytes Labs 2026-05-22

Update Chrome now: Critical bugs could let attackers run code

Read original →

Malwarebytes Labs 2026-05-22

Update Chrome now: Critical bugs could let attackers run code

Read original →

Unit 42 2026-05-22

Paved With Intent: ROADtools and Nation-State Tactics in the Cloud

Read original →

Unit 42 2026-05-22

Paved With Intent: ROADtools and Nation-State Tactics in the Cloud

Read original →

Kaspersky Securelist 2026-05-22

Cloud Atlas activity in the second half of 2025 and early 2026: new tools and a new payload

Read original →

Kaspersky Securelist 2026-05-22

Cloud Atlas activity in the second half of 2025 and early 2026: new tools and a new payload

Read original →

SANS Internet Storm Center 2026-05-22

Cross-Platform NPM Stealer, (Fri, May 22nd)

Read original →

SANS Internet Storm Center 2026-05-22

Cross-Platform NPM Stealer, (Fri, May 22nd)

Read original →

SANS Internet Storm Center 2026-05-22

ISC Stormcast For Friday, May 22nd, 2026 https://isc.sans.edu/podcastdetail/9942, (Fri, May 22nd)

Read original →

Krebs on Security 2026-05-21

Alleged Kimwolf Botmaster ‘Dort’ Arrested, Charged in U.S. and Canada

Read original →

Cisco Talos Intelligence 2026-05-21

The art of being ungovernable

Read original →

Headlines sourced from third parties. Click any item to read the original article on the publisher's site.

Right Answer. Right Person. Right Time.

Conundrum delivers answers about the threats that matter to your organisation. We provide a customisable intelligence collection solution tailored to your industry and priorities.

Off-network and privacy-preserving — you gain complete threat visibility while your sensitive systems remain untouched.

Request a Demo

75%

Time Saved

on threat intelligence gathering and analysis*

24/7

Automated Collection

from 50+ OSINT sources with zero manual effort*

90%

Cost Reduction

compared to traditional CTI platforms and services*

* Estimated results based on automated OSINT collection, AI-powered analysis, and elimination of manual threat intelligence workflows.

What you can do with Conundrum

Collect, analyse, and act on threat intelligence, all from a single platform designed for security and intelligence teams.

Multi-Tenant Architecture

Complete data isolation with schema-level separation. Each organization's intelligence data remains fully segregated and secure.

Off-Network Operation

Operates completely independently of your client systems. No network access to your infrastructure, no data exfiltration risk. Your sensitive systems stay secure and isolated.

Analyst Workbench

Dedicated workspace for intelligence analysts to edit reports, manage active investigations, and track in-progress items. Collaborate on findings before dissemination.

Audit Logging

Comprehensive activity tracking and audit trails for all user actions, report generations, and system events. Full accountability and compliance support.

Automated Intelligence Pipeline

24/7 automated collection from 50+ OSINT sources with zero-cost web scraping. Automatic PIR mapping and report generation based on your requirements.

AI-Powered Analysis

Dual-mode AI chat with RAG for document Q&A and PIR-based threat analysis. 5-stage LLM pipeline for professional CTI report generation.

Customizable Notifications

Flexible email and SMS notification system with per-user customization. Stay informed about breaking threats, new reports, and critical intelligence updates.

Advanced Search

Full-text search across all reports, threat feeds, and PIRs with advanced filtering. Generate aggregate reports from custom search queries.

Aggregate Reports

Automated weekly, monthly, quarterly, and annual intelligence summaries. Comprehensive trend analysis across multiple threats with executive-ready formatting.

Pricing built for businesses of all sizes

From growing teams to large-scale enterprise deployments.

  • Automated Reports
  • 24/7 Email Support
  • PIR Customization
  • ICP Fine Tuning
  • Aggregate Reports
Pricing
contact sales
Contact Sales View team pricing

Frequently asked questions

Conundrum is primarily designed with mature enterprise organizations in mind. As an example, our platforms and solutions are mostly used by organizations with at least one or two cyber security analysts.

However, organizations of any size and at any security maturity level would benefit from our robust yet easy to access, manage, and use Threat Intelligence Solutions.

Get started with Conundrum today

Connecting with intelligence management experts has never been easier. Email or call for a free consultation or demo request today.