No Results Match Your Search
Please try again or contact marketing@threatconnect.com for more information on our resources.
Setting Up the ThreatConnect TAXII Server User
The ThreatConnect® TAXII™ server can be used by an external TAXII client to retrieve data from a ThreatConnect user’s Organization and any Communities or Sources to which the user has access. To connect to the ThreatConnect TAXII server, the external TAXII client will require login credentials (username and password), which are configured by creating a […]
Mapping Connected infrastructure with ThreatConnect and Domain Tools
The more information you have about a potential threat, the better you can defend against it. In order to stay ahead of malicious actors, it is crucial that security teams add context and enrichment to their threat data. The combination of the DomainTools Spaces App for ThreatConnect and DomainTools Iris investigative platform empower security professionals […]
ThreatConnect Intelligence: What is it and how do I best utilize it?
Watch this webinar to learn: – Where do I access ThreatConnect Intelligence? – What does ThreatConnect Intelligence include? – How do I find intelligence relevant to my industry? – Don’t have ThreatConnect Intelligence – how do I get it?
ThreatConnect Dashboards Overview
Learn about ThreatConnect’s latest feature “ThreatConnect Dashboards” ThreatConnect now comes with pre-built dashboards that we’ve designed to help you understand important information and make key decisions faster. Dashboards are completely customizable to your needs.
Fusing Intelligence Operations with Security Orchestration
Featured Speakers: – Andy Pendergast Vice President of Product – ThreatConnect – Jon Oltsik Senior Principal Analyst – Enterprise Strategy Group The cybersecurity landscape moves at an incredibly fast pace. Analysts make decisions every day that impact the security of the entire organization: Where should I look next? What should I do about this alert? […]
ThreatConnect STIX TAXII
Learn more about ThreatConnect’s STIX-TAXII capabilities in this short video.
Demystifying Intelligence Analysis
Watch this video to learn how to research threats and build better processes in your organization.
Mitigate Threats Faster with an Intelligence-Driven Defense
Learn how to understand adversaries and mitigate threats to your network faster using threat intelligence. For more information, visit threatconnect.com/solutions.
Threat Intelligence Platforms: Open Source vs. Commercial
In this white paper, we discuss the key technical and economic considerations every security team needs when contemplating an open source or commercial threat intelligent platform.
ThreatConnect Playbook Actions
Learn how to unite your threat intelligence and orchestration using ThreatConnect. tc-pm@threatconnect.com
Turn Historical Threat Data into Actionable Intelligence Using Analytics
Learn how threat data becomes intelligence, how to structure historical threat data for tactical planning, and more.
A ThreatConnect Success Story: Upgrading from an Open Source TI Database
Find out how ThreatConnect helped a customer meet these objectives: Transfer all existing data from the open source database to ThreatConnect. Maintain all original creation dates, since the customer relied upon the dates for reporting, metrics, and memorialization. Ensure the transition from a dev environment to production was seamless.