Protective Intelligence

OBSIDIAN

The protective shield of the EternaEdge ecosystem. OBSIDIAN detects foreign targeting, insider threats, and asset vulnerabilities—before they become incidents—through counterintelligence-first analytics and multi-signal correlation.

OBSIDIAN runs on the APEX Platform—sharing entity resolution, risk scoring, and orchestration with all EternaEdge products. One intelligence foundation. No silos.

One Product. Three Mission Areas.

OBSIDIAN delivers counterintelligence, insider threat, asset protection, and vetting capabilities through three purpose-built modules—each with clear outcomes.

OBSIDIAN Guard

Behavioral Analytics & Insider Threat Detection

Continuously monitors behavioral patterns across digital, physical, and organizational signals to detect insider risk before it escalates.

  • Establishes behavioral baselines for each individual
  • Correlates anomalies across access, travel, cyber, and OSINT
  • Generates risk-prioritized alerts—not alert floods
  • Initiates FORGE investigation cases when thresholds are met
See how it works

OBSIDIAN Shield

Program Protection & Foreign Targeting

Monitors your most sensitive programs, technologies, and supply chains for signs of foreign intelligence interest or active targeting.

  • Maps assets to threat actors and collection priorities
  • Detects targeting activity across OSINT, cyber, and travel signals
  • Identifies supply-chain vulnerabilities and foreign dependencies
  • Generates proactive early warnings—not post-incident reports
See how it works

OBSIDIAN Check

Vetting, Due Diligence & FOCI Risk

Automates background investigations for personnel, vendors, and partners—with continuous monitoring for adverse changes.

  • Maps beneficial ownership and hidden corporate structures
  • Screens against sanctions, PEPs, and adverse media
  • Detects FOCI indicators for defense contractor compliance
  • Generates audit-ready reports with CI red flags
See how it works

From Signals to Action

OBSIDIAN transforms raw signals into actionable intelligence through a clear, auditable workflow—with human-in-the-loop where it matters.

1
Signal Ingestion
Digital, physical, travel, OSINT, cyber
2
Entity Resolution
Unified via APEX platform
3
Multi-Signal Correlation
CI context, not isolated events
4
Risk Scoring
APEX shared risk engine
5
Alert & Action
Threshold-triggered workflows
Example: Insider Risk Escalation

An employee with access to a sensitive program begins accessing files outside their normal scope. PATHWAY detects recent travel to a sensitive country. STRATUM flags anomalous data exfiltration patterns. OBSIDIAN correlates these signals into a single risk profile, elevates the score, and automatically initiates a case in FORGE CaseOps for investigation—with full evidence chain attached.

What Makes OBSIDIAN Different

Not another point tool. OBSIDIAN is counterintelligence software built for multi-domain fusion, intent detection, and continuous vetting.

CI-First Approach

Built on counterintelligence tradecraft—not retrofitted IT security. OBSIDIAN evaluates intent, targeting, and adversary TTPs—not just policy violations.

Multi-Signal Correlation

Fuses digital activity, physical access, travel, cyber indicators, and OSINT into a unified risk picture—through APEX entity resolution.

Intent & Targeting Detection

Goes beyond anomaly detection to identify patterns consistent with foreign collection, technology theft, or insider recruitment.

Ecosystem Integration

Shares entity resolution and risk scoring with LUCID, STRATUM, PATHWAY, and FORGE. One platform—no duplicate profiles or conflicting assessments.

Audit-Ready Governance

Full chain of custody, decision logging, and compliance-ready reporting. Designed for NISPOM, CMMC, and continuous evaluation requirements.

Proactive Early Warning

Designed to detect threats during the reconnaissance and targeting phase—before compromise occurs—not after the damage is done.

Use Cases

How organizations use OBSIDIAN to detect and mitigate protective intelligence risks.

Foreign Targeting Detection

A defense contractor's emerging technology program attracts unusual interest. Foreign entities make conference contact attempts, OSINT probing increases, and cyber reconnaissance targets the program's supply chain.

OBSIDIAN Shield correlates these signals, identifies the targeting pattern, and generates an early warning assessment—before any compromise occurs.

Insider Risk Escalation

A cleared employee begins exhibiting concerning behavioral changes: after-hours access, downloading sensitive documents, recent travel to a sensitive region, and unusual financial transactions.

OBSIDIAN Guard detects the pattern across multiple data sources, elevates the risk score, and initiates a confidential case in FORGE for HR and security review.

Supply Chain FOCI Risk

A critical supplier is acquired by a foreign investment firm. The new ownership structure involves shell companies and beneficial owners with ties to a foreign government entity.

OBSIDIAN Check maps the ownership structure, flags FOCI indicators, and generates a risk report for program managers and compliance teams.

Who Uses OBSIDIAN

OBSIDIAN serves counterintelligence, security, and compliance teams across government, defense, and enterprise environments.

CI Teams
Counterintelligence & Security
Security Leadership
CISOs, CSOs, Directors
Program Protection
SAP/SCI Managers
Insider Threat Hub
InTH Teams & Analysts
HR & Procurement
Vetting with Guardrails
Legal & Compliance
Due Diligence & FOCI

Ready to See OBSIDIAN in Action?

Schedule a demo to see how OBSIDIAN can transform your counterintelligence and insider threat programs.