Threat Intelligence (TI) fetches information and insights about existing or potential cyber threats and risks from various sources. It then assembles, processes and analyzes the fetched information and uses it to predict data breaches, vulnerable attacks and any evidence of pre-planned attacks or threats and notifies about it in real-time. You can also link custom threat data sources and fetch and analyze their logs.
Supported Sources
Emerging Threats
Critical Stack
CSIS
Custom CSV
MISP
Blueliv
Recorded Future
StixTaxii
Threat Intelligence Components
ThreatIntelligence
ti
We are glad this guide helped.
Please don't include any personal information in your comment
Contact Support