Skip to main content

Explore Featured Resources

Showing 292 resources items
Sort

No Results Match Your Search

Please try again or contact marketing@threatconnect.com for more information on our resources.

Common & Best Practices for Security Operations Centers: Results of the 2019 SOC Survey
Security Operations

Common & Best Practices for Security Operations Centers: Results of the 2019 SOC Survey

SANS recently surveyed their members in hopes to provide objective data to security leaders and practitioners who are looking to establish a SOC or optimize their existing SOCs. The most frequently cited barriers to excellence were lack of skilled staff (58%) followed by absence of effective orchestration and automation (50%). Download the paper to see […]

A ThreatConnect Success Story: Automating the Process of Blocking Malicious Indicators with Playbooks
ThreatConnect Platform

A ThreatConnect Success Story: Automating the Process of Blocking Malicious Indicators with Playbooks

Find out how ThreatConnect helped a customer: Quickly build Playbooks and create proper workflow  Speed up the process from identifying malicious indicators and getting block controls put in place for them

A ThreatConnect Success Story: Identifying Additional Insights on Cyber Adversaries
ThreatConnect Platform

A ThreatConnect Success Story: Identifying Additional Insights on Cyber Adversaries

Find out how ThreatConnect helped a customer: Validate their own findings regarding the adversaries they were tracking. Identify any known intelligence and operations gaps in analysis that pose a risk to themselves and their environment.

Mandiant Threat Intelligence
Threat Intelligence Operations

Mandiant Threat Intelligence

ThreatConnect and Mandiant Threat Intelligence have partnered to deliver Mandiant Threat Intelligence into the ThreatConnect platform. With this integration, cybersecurity teams are provided the necessary intelligence to defend against emerging cyber threats.

ThreatConnect Platform

ThreatConnect Training: Playbook Components

Watch this training to learn what components are, when to use them, and examples of components. We also show you how to design, use, and save a Component. At the end, we build a Component from scratch.

Threat Intelligence Operations

The Hunt is On: Fusing Global Threat Intelligence with a Threat Intelligence Platform

Hear experts from Symantec and ThreatConnect discuss how to select and effectively use threat intelligence to thwart attacks. In this webinar, you will learn: the sources and categories of effective threat intelligence; how you can use contemporary analysis tools to operationalize threat intelligence and make it actionable, and; popular use cases in which peer organizations […]

Threat Intelligence Operations

Threat Intelligence Isnt One Size Fits All

Threat intelligence (TI) can help any organization better protect themselves. With TI, you can identify threats and add context to them. Once you understand what you are facing, you can take decisive action to better protect your organization. The need for high-quality, relevant threat intelligence is clear, yet many organizations still struggle with how to […]

Threat Intelligence Operations

Video: Threat Intelligence Processes are a Journey; Not a Destination

A decade ago manual analytics were all the rage. Unfortunately, yesterday’s processes can no longer scale to the threats of today. For example, many organizations are still convinced the answer to threat intelligence is a SIEM and vendor feeds – yet are complacent in allowing analysts to conduct highly repetitive and manual tasks versus enabling […]

ThreatConnect  RSA® NetWitness® Suite Integration
Threat Intelligence Operations

ThreatConnect RSA® NetWitness® Suite Integration

ThreatConnect and RSA have partnered to enable users to detect and act on ThreatConnect intelligence in the NetWitness Platform. With this integration, users can aggregate their internal logs and combine them with validated threat intelligence, so they can easily spot trends or patterns that are out of the ordinary and act on them efficiently as […]

ThreatConnect IBM QRadar Integration
Threat Intelligence Operations

ThreatConnect IBM QRadar Integration

ThreatConnect® and IBM® have partnered to enable users to detect and act on ThreatConnect intelligence from within IBM QRadar®. This integration allows users to combine validated Threat Intelligence in ThreatConnect with their aggregated internal logs from QRadar. Users can easily spot trends or patterns that are out of the ordinary and act on them efficiently.

ThreatConnect Training, Workshops, and Services Catalog
ThreatConnect Platform

ThreatConnect Training, Workshops, and Services Catalog

Within this catalog, find a complete listing of ThreatConnect administered training, workshops, and service offerings. Constantly expanding, these offerings focus on kickstarting your experience with ThreatConnect to decrease your time to value, and ultimately help you master the ThreatConnect Platform.

Rating Threat Intelligence: Skulls Scale for Cyber Threats
Threat Intelligence Operations

Rating Threat Intelligence: Skulls Scale for Cyber Threats

In order for threat intelligence sharing and community collaboration to work, we all need to be speaking the same language.  We, the analysts at the front lines, need a standard vocabulary and a standardized rating system so that we are all evaluating threats in the same manner.