Our Partners

EclecticIQ partners with the industry's leading intelligence specialists, technology providers and commercial partners, and maintains active membership in key intelligence communities.

intelligence Partners


Exodus Intelligence

Exodus Intelligence provides clients with actionable information, capabilities, and context for proven exploitable vulnerabilities. Their world class team of vulnerability researchers discover hundreds of exclusive Zero-Day vulnerabilities, providing their clients with this knowledge before the adversaries find them. Their research also extends into N-Day research.



Flashpoint is the market leader in threat intelligence from the Deep and Dark Web. Flashpoint’s products illuminate threatening actors, relationships, behaviors, and networks.



Group-IB is a global leader in preventing and investigating high-tech crimes and online fraud, runs the largest computer forensics laboratory in Eastern Europe and is recommended by OSCE.


Intel 471

Intel 471 provides an actor-centric intelligence collection capability. Our intelligence collection focuses on infiltrating and maintaining access to closed sources where threat actors collaborate, communicate and plan cyber attacks.

technology Partners


Cambridge Intelligence

Cambridge Intelligence helps people to understand connected data. Using the award-winning KeyLines network visualization toolkit, organizations can uncover data insights and detect evolving threats


HPE Security

HPE draws on decades of enterprise security experience and powers much of the world’s security intelligence to uncover vulnerabilities, identify threats and neutralize them so that, instead of simply reacting, you can proactively counter adversaries.


Perceptive Security

Perceptive Security provides consulting and custom solutions for projects for security management, SIEM and SOC teams, including security threat analysis, customization and training.

commercial Partners



Cosive is a specialist in incident response and threat intelligence. We have expert knowledge of CSIRTs and SOCs, and we understand your pain points. We will help you optimise your processes and tools and to find the best solution for your needs.



DeepCyber supports its customers, with an “intelligence-driven” approach, to improve their proactive detection and response "capability" of cyber threats. It is specialized in Advanced Intelligence (surface, deep and dark web), Protection and Antifraud, using a methodology oriented to "data fusion".


Managed Services

Managed Services Company is a startup specializes in providing bespoke services in the field of Cyber Security.


New Context

New Context is the security innovator for highly regulated industries. Our products and consulting services enable global leaders in energy, government and across the enterprise to prepare for security orchestration, building critical infrastructure that works with emerging technologies. New Context consultants work as high-value partners of customer security operations, building tools for CTI, security automation & orchestration and data governance.


Pink Elephant

Pink Elephant is a premier global training, consulting and conference service provider.



Proximus is a telecommunication & ICT company operating in the Belgian and international markets, providing services to residential, enterprise and public customers.

community Partners



The Financial Services Information Sharing and Analysis Center is the global financial industry's go to resource for cyber and physical threat intelligence analysis and sharing. FS-ISAC operates as a member-owned non profit entity. EclecticIQ is an affiliate member.


Hague Security Delta (HSD)

The Hague Security Delta (HSD) is the largest security cluster in Europe. In this Dutch cluster businesses, governments, and knowledge institutions work together on innovation and knowledge in the field of safety and security.


OASIS CTI Technical Committee

The OASIS Cyber Threat Intelligence (CTI) TC was chartered to define a set of information representations and protocols to address the need to model, analyze, and share cyber threat intelligence.