THE FIVE PILLARS OF THE MALTEGO OFFERING
Novice investigator or leader of enterprise analyst team, find your customized Maltego solution to optimize your investigations.
Easily gather information from disparate data sources.
Automatically link and combine all information into one graph.
Visually explore relationships in your data.
At the German Federal Criminal Police Office, we started using Maltego in 2016 and have kept adding more seats ever since. We consider Maltego as an indispensable tool to fight crime for the new generation of policemen.
German Federal Criminal Police Office (Bundeskriminalamt)
A great strength of Maltego is the ease of gaining insights from multiple, disparate data sets. In the past couple of years, Maltego has been increasingly developed towards a relevant market place for data and I am excited to see how this will evolve in the future.
Maltego is the first tool I'd install on any researchers laptop, and the first I open any time I'm starting a new investigation. From the ability to access many different data sources through one tool, to the advanced visualisations, its an absolutely essential part of modern cybercrime research
Maltego allows us to quickly pull data from profiles, posts, and comments into one graph, where we can conduct text searches and see connections. In just a few minutes, we can narrow initial research to a handful individuals using variations of aliases connected to suspected local traffickers. We would not have been able to do that without Maltego.
Our Academic and Research Partners
The Power of Transforms
Transforms are small pieces of code that automatically fetch data from different sources and return the results as visual entities in the desktop client. Transforms are the central elements of Maltego which enable its users to unleash the full potential of the software whilst using a point-and-click logic to run analyses.
Explore step-by-step. Transforms are designed to build on each other, so you can create complex graphs.
Automate in a click. Execute a set of Transforms in a pre-defined sequence to automate routines and workflows.
Create your own queries. Use the Transform Development Toolkit to write and customize your own Transforms, and to integrate new data sources.
How Investigators use Maltego
Cyber Security Investigation
Contextualize and visualize your threat data. Detect and help prevent potential cyber attacks.
Gather, visualize and analyze evidence of criminal activity targeting your products, services and company IP.
Person of Interest Investigation
Gather and merge information on known targets, visualize relationships and patterns, and drive investigations forward.
Enrich your investigations by building and visualizing relationship maps from CSV and other file imports.
23 Oct 2020
Malware and phishing attacks are among the most common cybersecurity threats that organizations and corporations constantly deal with. Attackers typically attempt to compromise a computer or network …
21 Oct 2020
We are pleased to announce a major rewrite of one of the most popular Maltego Hub item: The Shodan Transforms! Shodan is the world’s first search engine for Internet-connected devices. With …
20 Oct 2020
Phishing is one of the oldest and most common cyber threats. From individual online shoppers to corporation managers, any internet user can be potentially subjected to phishing attacks. Phishing …
14 Oct 2020
One of the routine tasks Maltego is used for by analysts and experts worldwide is infrastructure footprinting on an organization’s network. Also known as reconnaissance, footprinting is the …