Join the global, vetted community
Our anonymization technology preserves your privacy and gives you the freedom to share and collaborate without exposing your company to market risk. Our platform provides members provably anonymous report submission (even to us) through its patent-pending authentication protocol.
After anonymously submitting a report to TruSTAR, it is immediately correlated with dozens of relevant data sources - including reports from other members, open source feeds, and leading third-party threat intelligence providers. This greatly enriches your submissions with actionable context, allowing you to piece together more of the threat response puzzle.
Leverage knowledge from across the network of security operators with our integrated, end-to-end encrypted chat tool designed to drive to mitigations fast. This allows you to collaborate in real-time with other security analysts confidentially about the threats that really matter.Read the blog post
We recognize that timeliness in collaboration and information sharing is critical. In order to share the most important attack information early enough in the incident response cycle for it to matter, we have to reduce your corporate risk.
How do we remove the risk from collaboration? The answer is anonymity. We've developed an anonymous sharing protocol and privacy-preserving redaction tools to allow community members to collaborate without disclosing any attributable information.
When you collaborate on our platform not even we can identify you.
BUT, minimizing risk is not enough, we have to provide maximum value return on collaboration. So, when you join TruSTAR you immediately see filtered, relevant insights from:
We will respond within 24 hours. No spam.