The value of information cannot be realized
unless it is possible to find it
Healthcare
Legal
Insurance
Manufacturing
Background Checks
Banks
Cyber Insurance
Sports
Venues Entertainment
Executive Protection
Brand Management and Protection
Self-Assessment
Merger & Acquisition Due Diligence
Compromised Credentials
Insider Threat
Cyber Insurance
Vendor Risk Management
Threat Intelligence
Vulnerability Management
Threat Hunting
Automated, human intelligence collection and finished intelligence reporting from cybercriminal forums, marketplaces, chat rooms and online engagements
An industry leading intelligence requirements program that enables organizations to map intelligence collection and outputs to business drivers and risk reduction
Automated and technical tracking of malware including IoCs, TTPs, YARA, IDS signatures and technical intelligence reports
Vulnerability intelligence to drive your patching priorities and compromised credentials of your employees, VIPs and customers
Information from known attacks, which has the potential to immediately influence cybersecurity decision-making
Offers insight into threat actors’ motivations, capabilities and objectives, and helps teams assess specific incidents relating to events and investigations, and guides and supports incident response
Broader and higher-level abstracts of the data to identify threats associated with foreign policy, global events etc., and focuses on the long-term impacts of cyber threats
TTI is information that is normally consumed through technical resources. TTI typically feeds the investigative or monitoring functions of an organization, for example firewalls and mail filtering devices, by blocking attempted connections to suspect servers. TTI also serves for analytic tools, or just for visualization and dashboards
Internal Sources | External Sources | |||
---|---|---|---|---|
Example | Technologies for collecting and processing | Vulnerabilities databases, IP blacklists and whitelists, threat data feeds | Forums, news sites, social media, dark web | |
Technologies for collecting and processing | Feed parser | Feed/web scraper, parser | Collection: crawlers, feed/web parsers Processing: Natural Language Processing (NLP), machine learning |