Threat Intelligence

Threat Intelligence (TI) fetches information and insights about existing or potential cyber threats and risks from various sources. It then assembles, processes and analyzes the fetched information and uses it to predict data breaches, vulnerable attacks and any evidence of pre-planned attacks or threats and notifies about it in real-time. You can also link custom threat data sources and fetch and analyze their logs.

Supported Sources

  • Emerging Threats

  • Critical Stack

  • CSIS

  • Custom CSV

  • MISP

  • Blueliv

  • Recorded Future

  • StixTaxii

Threat Intelligence Components

  1. Enrichment Source
    • ThreatIntelligence

  2. Process Command
    • ti


Helpful?

We are glad this guide helped.


Please don't include any personal information in your comment

Contact Support