Cybersecurity at Relativity
Staying one step ahead
With the average cost of a data breach ringing in at around US$5 million, there’s no room for error in today’s relentless threat landscape. Relativity’s cybersecurity team is built around proactive defense to give you peace of mind.
Proactive Processes
Threat Modeling
Our threat modeling procedures help us plan for attacks and determine how to slow them down, or better yet: prevent them altogether. We refine our models continuously – so as attackers get savvier, we stay one step ahead.
Zero-Trust Architecture
Call us skeptics, but before we trust, we need to verify. We continuously validate every stage of digital interaction, providing layers of protection within our organization and resulting in even higher levels of security for our customers.
Defense in (Greater) Depth
Defense in depth means security controls at every layer – and we take that a few steps deeper with advanced security programs and tools.
- Next-generation and web application firewalls to defend our perimeter and stop attackers in their tracks
- Real-time detection of defects, compliance misconfigurations, and attacks
- Inline network security groups that define strict permissions and system accessibility
- Real-time scanning endpoint detections and response
Proactive Intelligence
Multiple Sources of Intelligence
Our cyber detection and automation teams use multiple threat intelligence sources – from Recorded Future, Microsoft Threat Intelligence, and communities such as IT-ISAC – to give us even more confidence in everyday cyber decision making.
Protecting Customers by Name
We’re constantly on the lookout to protect not just Relativity’s brand, but our customers’ brands as well. We proactively monitor our threat intelligence platforms for mentions of our customers, and immediately inform anyone who pops up.
Serving the Community
Our free-to-use threat intelligence platform continuously monitors more than 200 intelligence data feeds – with new data pouring in constantly. The platform provides real-time access to actionable insights, alerts, and expert analysis.
Single Source of Truth
All the data that comes into the platform is scored according to relevance and accuracy, then merged with other commercial threat intelligence information from government and other sources.
Endpoint Protection
Information from the platform is distributed to next-generation firewalls, anti-malware, anti-spam, and endpoint detection and response solutions to provide protection.
Focused Security
Automated monitoring means our analysts can focus on high-level threats and proactive threat hunting – rather than manually investigating every alert. The context-rich data also helps us optimize workflows to mitigate risk.
Get AccessDark Web Analysis
We scour Tor sites, hacker forums, paste sites, and anywhere else a hacker might lurk for suspicious behavior, breach indicators, and credential dumps. Keeping an eye on the dark web helps us learn from cybercriminals, keep up with evolving threats, and act in real time.
Internal Threat Analysis
Threats don’t only come from the outside in, so we keep a close profile on the behaviors and activities of our own community to protect against insider threats and ensure our intellectual property is always secure.
Strong Connections
We work with other tech platforms and their expert communities – such as Azure Security Center, Recorded Future, Anomali, and Signal Sciences – to gain early intel into the spaces where threat actors communicate, plan, and execute cyber activities.
Proactive Alliances
Calder7 is part of a network of cybersecurity professionals, and we regularly share events and indicators of compromise, output of analyses, and regular educational offerings. In return, we receive invaluable insight into threats in the wild and have the chance to help increase security around the globe.


Information Technology and Information Sharing and Analysis Center
A forum for managing risks and strengthening IT infrastructure through cyber-information sharing and analysis.

Mitre Attack
An adversary behavior framework that helps us understand risks, plan, verify defense, and help the community take a proactive defensive stance.

Open Web Application Security Project
An organization that provides unbiased and practical cost-effective information about computer and internet applications.

Cloud Security Alliance
A not-for-profit organization that promotes best practices for securely operating in a cloud environment.

LS-ISAO
A member-driven community that shares actionable cyberthreat and systems vulnerability information among law firms for their mutual defense.
Stay One Step Ahead: Threat Landscape Updates
Join the Relativity Community for access to Calder7’s weekly intelligence briefs, detailing the latest cybersecurity threats and how to guard against them.
Learn more about cybersecurity at Relativity

Passwords 101: How They’re Hacked and Why Longer Is Better
There are plenty of misconceptions when it comes to passwords, but one thing is for sure: the more complex, the better.

6 Crucial Tips from the Field to Help You Build Your Cybersecurity Strategy
Get a head start against cyber-attacks with some in-the-field advice from the Relativity community.

Buckling Up for a Data Breach: What’s Your Game Plan?
While a data breach may be unavoidable, having a calculated response plan is entirely in your hands. Read expert tips for how to prepare.