Search results for:
-
Feb 16th, 2019
Building a Threat Intelligence Program – Growing the Program
The 2018 Building a Threat Intelligence Program Survey focuses on how organizations are leveraging threat intelligence to combat increasing cyber threats. Among cybersecurity decision makers, 52% sa
-
Feb 16th, 2019
ISAC and ISAO Edition Case Study
This case study illustrates how a Cyber Threat Response Organization used the ThreatConnect ISAC and ISAO Edition to provide a single Threat Intelligence Platform (TIP) for their membership to aggrega
-
Feb 15th, 2019
ThreatConnect Apps: Make the Most of Your Existing Tools
Having all of your threat data in one place can save you valuable time and effort. And maximizing the effectiveness of your existing tools can open the doors to a wealth of actionable threat intellige
-
Feb 15th, 2019
ThreatConnect App for Splunk Enterprise
ThreatConnect provides the ability to aggregate threat intelligence from multiple sources (i.e., open source, commercial, communities, and internally created), analyze and track identified adversary i
-
Feb 14th, 2019
More is Not More: Busting the myth that more threat intel feeds lead to better security
It’s a common misconception that a large quantity of threat intelligence feeds leads to more effective security. Unfortunately, threat feed overindulgence can lead to confusion, disorganization, and
-
Feb 14th, 2019
ThreatConnect Enriches Data Case Study
This case study illustrates how an organization utilizing ThreatConnect was able to develop a predictive network defense by taking a single indicator discovered from network traffic monitoring and fin
-
Feb 13th, 2019
How Mature Is Your Threat Intelligence Program?
Just getting started with a TI program or seeking to expand an existing one? The Threat Intelligence Maturity Model infographic helps you understand where your organization resides on the path to a
-
Feb 13th, 2019
Multi-Environment Orchestration
Run Any Playbook Across Any Environment, In Real-Time ThreatConnect’s Multi-Environment Orchestration expands the capabilities of Playbooks, which allows you to automate almost any cybersecurity tas
-
Feb 10th, 2019
ThreatConnect’s Customer Success Team
Our Customer Success team is dedicated to ensuring that you can articulate, progress towards, and ultimately achieve your threat intelligence and security program goals. Each customer is assigned a de
-
Feb 10th, 2019
Smarter = Faster: Security Orchestration with Threat Intelligence
Understand how you can make smarter decisions to move faster — both blocking an adversary and disrupting them altogether — by using orchestration with intelligence.
-
Feb 9th, 2019
ThreatConnect Powered by SAP HANA
The latest edition of the ThreatConnect platform is built on SAP’s ground-breaking in-memory computing technology to enable you to move at the same speed as your adversary. It has the same robust f
-
Feb 8th, 2019
Financial Services Sees Success with Smarter Threat Intelligence
We’ll examine one global financial services organization’s set-up and continued success with using the integration, and attendees will walk away with a new tool in their arsenal to effectively ana