Get in Touch
Have questions about our threat intelligence platform? Need help with integration? We're here to help.
Quick Response
We typically respond within 24 hours during business days.
Need API Documentation?
Check out our comprehensive API docs for integration guides and examples.
Send us a message
Dedicated Security Support
Our support team consists of security professionals who understand the unique challenges of implementing and operating threat intelligence solutions. Whether you need help with API integration, dashboard configuration, or interpreting threat data, you'll get expert assistance from people who speak your language. We provide multiple support channels to meet your needs: email for detailed inquiries, documentation for self-service, and dedicated account managers for enterprise customers.
Integration Assistance
Getting the most value from threat intelligence requires proper integration with your existing security tools. Our support team can help you: • Configure SIEM integrations with Splunk, QRadar, and Sentinel • Set up SOAR playbooks for automated threat response • Implement API calls in your custom applications • Optimize data ingestion for performance and accuracy We provide code examples, configuration templates, and personalized guidance to accelerate your implementation.
Enterprise Support Options
For organizations with mission-critical deployments, we offer enhanced support packages including: • Dedicated technical account manager • Priority response times (< 1 hour for critical issues) • Quarterly business reviews • Custom integration development • On-call support for incident response Contact our sales team to learn more about enterprise support options tailored to your organization's needs.
Helpful Resources
Find answers in our documentation and blog posts.

API Integration for Threat Intelligence
Complete guide to integrating our APIs into your security stack.
Read More
Building a Modern SOC with Threat Intelligence
How to effectively integrate threat intel with your SOC.
Read More
How to Detect Malicious Domains and IPs
Practical guide to reputation checking and threat assessment.
Read More