The industry's only threat intelligence operations platform.
Unified threat intel, context, and knowledge at the point of analysis and decision-making.
Use automation to help quantify cyber risk in financial terms.
Plan your threat intelligence journey.
Read about the powerful combination of ThreatConnect and Polarity.
Learn why ThreatConnect is ranked highest in the current offering category of all evaluated CRQ tools.
Learn why ThreatConnect is the leading modern threat intelligence operations platform.
Learn how our customers are using ThreatConnect to collect, analyze, enrich and operationalize their threat intelligence data.
See all industry awards and recognitions ThreatConnect has received over the years.
Discover the latest from ThreatConnect! From content to news to industry insights, stay connected with what’s happening in security.
Read our newest insights, thought leadership, cyber news, and platform updates.
Check out and register for our upcoming events, conferences, and webinars.
Catch up on the latest ThreatConnect press releases, media coverage, and news.
Discover how Wyndham's security teams enhanced their threat detection and response with ThreatConnect TI Ops and Polarity, streamlining operations and improving efficiency.
This guide equips CRQ solution buyers with the knowledge to assess and determine the appropriate solution across a variety of use cases when implementing or evolving a CRQ program.
A decade ago manual analytics were all the rage. Unfortunately, yesterday’s processes can no longer scale to the threats of today. For example, many organizations are still convinced the answer to threat intelligence is a SIEM and vendor feeds – yet are complacent in allowing analysts to conduct highly repetitive and manual tasks versus enabling […]
ThreatConnect® and RSA® have partnered to enable users to detect and act on ThreatConnect intelligence in the NetWitness Platform. With this integration, users can aggregate their internal logs and combine them with validated threat intelligence, so they can easily spot trends or patterns that are out of the ordinary and act on them efficiently as […]
ThreatConnect® and IBM® have partnered to enable users to detect and act on ThreatConnect intelligence from within IBM QRadar®. This integration allows users to combine validated Threat Intelligence in ThreatConnect with their aggregated internal logs from QRadar. Users can easily spot trends or patterns that are out of the ordinary and act on them efficiently.
Within this catalog, find a complete listing of ThreatConnect administered training, workshops, and service offerings. Constantly expanding, these offerings focus on kickstarting your experience with ThreatConnect to decrease your time to value, and ultimately help you master the ThreatConnect Platform.
In order for threat intelligence sharing and community collaboration to work, we all need to be speaking the same language. We, the analysts at the front lines, need a standard vocabulary and a standardized rating system so that we are all evaluating threats in the same manner.
Learn how ThreatConnect solved these problems for a customer: Improved focus on alerts within the organization Significant workload reduction through automated enrichment Consistent communication of threat and incident information internally and externally
Follow along with Dan Cole, Director of Product Management, and Drew Gidwani, Director of Analytics, as they discuss how to use visualization to make threat intelligence actionable. Tune into this webinar to learn the best practices for using dashboards and tracking security metrics, how to apply analytics in dashboards, and how to build a dashboard […]
Ground truth is one of the most important sources informing threat intelligence. A key source of this truth is what’s happening in the SIEM- QRadar in this case. Knowing this, we needed a way to the correlate data in QRadar with intelligence in the form of Indicators in ThreatConnect. This Playbook was created to provide […]
During this video, 2 of the 3 co-authors of the Diamond Model for Intrusion Analysis, Sergio Caltagirone from Dragos and Andy Pendergast from ThreatConnect, talk about how to properly utilize the Diamond Model for Intrusion Analysis to triage incidents and categorize threat activity. ThreatConnect is the only threat intelligence platform built on the Diamond Model […]
Watch this webinar to learn about the top four things that we don’t always see customers doing, but that we think could be super helpful. They are also the four things that we get the most questions about from customers. You’ll learn about: – Operationalizing and optimizing ThreatAssess/CAL in your environment. – Tags and Attributes […]
ESG Lab evaluated the ThreatConnect threat intelligence, analytics, and orchestration platform, TC Complete, and two components of the platform, TC Analyze and TC Identify. Their goal was to validate how the ThreatConnect platform enables organizations to identify, manage, and block threats with end-to-end detection capabilities and advanced analytics. View the webinar to hear ESG Senior […]
Hear ThreatConnect’s Senior Threat Intelligence Researcher, Alex Valdivia, speak on a panel of experts on how to uncover the motivation and mitigation methods for threat actors targeting your organization.