Skip to main content
Download the Buyer’s Guide for Cyber Risk Quantification Solutions
Download Guide
Request a Demo

ThreatConnect Now Supports the MITRE ATT&CK Framework

Prioritize, Ask Questions, and Respond Faster with ATT&CK in ThreatConnect

July 11, 2019, Arlington, VA — ThreatConnect®, provider of the industry’s only intelligence-driven security operations platform today announces the support of the MITRE ATT&CK™ framework, a globally-accessible knowledge base of adversary tactics and techniques, within its own Platform. Users of the ThreatConnect Platform will now be able to classify their intelligence and derive meaningful conclusions to help prioritize responses.

The ATT&CK Framework was developed by The MITRE Corporation, and the ATT&CK knowledge base is used as a foundation for the development of specific threat models and methodologies in the private sector, in government, and in the cybersecurity product and service community.  The ThreatConnect Platform provides users with the ability to create meaningful custom queries to examine their intelligence using ATT&CK data, create custom dashboards to look for patterns, and create a course of action and escalation with Playbooks that tie back to intelligence.

Andy Pendergast, ThreatConnect’s VP of Product said, “We’re really excited about what the MITRE ATT&CK framework enables and the depths of our support for it. It is a powerful tool for understanding adversary behavior and potential gaps in defense.”

Leveraging ATT&CK within ThreatConnect will help Platform users classify indicators, prioritize threats, and automate processes. Directly from the ThreatConnect Platform, users are able to view all Techniques related to the MITRE Pre-ATT&CK and Enterprise ATT&CK Datasets. The Platform enables users to drill down into each Technique to get details mapped directly back to the information provided in the MITRE Framework.  And, paired with the flexibility of the ThreatConnect data model and ATT&CK implementation, users can now employ Dashboards to better understand the specific adversary tactics and techniques that a security team may encounter.

Added Pendergast, “As we see more and more customers adopting the ATT&CK framework, ThreatConnect wants to ensure they have the solution they need to classify activity, leverage knowledge of adversary techniques to aid investigations, make better informed and faster response actions, and automate defensive actions with intelligence beyond just using indicators of compromise. . This is just the first set of capabilities we are offering leveraging ATT&CK, we have several more powerful analytic use cases we will be implementing in upcoming releases, so stay tuned.”


About ThreatConnect

ThreatConnect, Inc. provides a proactive and efficient approach to security by enabling enhanced detection, shortened response, and reduced risk. Designed by analysts but built for the entire team (security operations, threat intelligence, incident response and security leadership), ThreatConnect’s intelligence-driven security operations platform is the only solution available today with intelligence, automation, analytics, and workflows in a single platform. To learn more about our threat intelligence platform (TIP) or security orchestration, automation, and response (SOAR) solutions, visit