Skip to main content

Explore Featured Resources

Showing 287 resources items
Sort

No Results Match Your Search

Please try again or contact marketing@threatconnect.com for more information on our resources.

Threat Intelligence Operations

The Business Case for Threat Intelligence

Take 30 minutes of your time to hear ThreatConnect, Inc. CEO Adam Vincent review the need for businesses to evaluate the cost of a sophisticated threat intelligence program. Learn more about the ROI calculator that evaluates cost/benefits of threat intelligence investments and offers quantifiable financial benefits and use-cases to demonstrate the overall costs associated with data […]

ThreatConnect For Managed Security Service Providers
ThreatConnect Platform

ThreatConnect For Managed Security Service Providers

MSSPs offer protection that many businesses simply can’t live without. With ThreatConnect, you can deliver even more value. ThreatConnect partners with MSSPs worldwide to use threat intelligence to improve and enhance the security and quality of service that providers offer to their clients. Many MSSPs integrate the ThreatConnect platform into their organization’s operations and into […]

Threat Intelligence Operations

Decoding Threat Intelligence

Watch Rick Holland, principal security and risk analyst for Forrester Research, and Adam Vincent, CEO of ThreatConnect, lead “Decoding Threat Intelligence.”

ThreatConnect and Cofense Intelligence
Threat Intelligence Operations

ThreatConnect and Cofense Intelligence

Cofense Intelligence andThreatConnect deliver the ability to acquire, aggregate and take action from phishing-specific machine-readable threat intelligence (MRTI). Using high fidelity phishing intelligence means that analysts can prioritize and decisively respond to alerts from intelligence consumed via Cofense’s API. With ThreatConnect, security teams are able to take action based on Cofense Intelligence indicators through their existing infrastructure to […]

ThreatConnect and Arcsight Joint Solution Brief
Threat Intelligence Operations

ThreatConnect and Arcsight Joint Solution Brief

ThreatConnect® and Micro Focus have partnered to enable users to detect and act on ThreatConnect intelligence in ArcSight Enterprise Security Management (ESM)™. This integration allows users to combine validated Threat Intelligence in ThreatConnect with their aggregated internal logs from ArcSight ESM. Users can easily spot trends or patterns that are out of the ordinary and act […]

Project CameraShy Closing The Aperture On China’s Unit 78020
ThreatConnect Platform

Project CameraShy Closing The Aperture On China’s Unit 78020

China is aggressively claiming territory deeper into the South China Sea, threatening economic and political stability in the Southeast Asia and beyond. The territorial activity is accompanied by high-tempo cyber espionage and malware attacks, malicious attachments and spear phishing, directed at Southeast Asian military, diplomatic, and economic targets. ThreatConnect®, in partnership with Defense Group Inc., […]

Threat Intelligence Platforms
Threat Intelligence Operations

Threat Intelligence Platforms

Everything you’ve ever wanted to know but didn’t know to ask Today’s threat environment is complex and dynamic. The internet was built for connectivity, not security, and approaches such as intrusion detection systems, anti-virus programs, and traditional incident response methodologies by themselves are no longer sufficient in the face of the widening gap between offensive […]

ThreatConnect and Crowdstrike Falcon Host
Threat Intelligence Operations

ThreatConnect and Crowdstrike Falcon Host

Through an expanded partnership with CrowdStrike, ThreatConnect® users can now act on intelligence in CrowdStrike Falcon Host. This integration allows users to discover and investigate both current and historic endpoint activity within seconds of ThreatConnect sending an indicator to CrowdStrike Falcon Host.

The Diamond Model for Intrusion Analysis
ThreatConnect Platform

The Diamond Model for Intrusion Analysis

“The Diamond Model for Intrusion Analysis” is the product of years worth of research and development by expert security analysts working on some of the toughest cyber security problems.  Informally, it is a cognitive model that presents a framework upon which to discover new activity, maximize analytic pivot opportunities, correlate and synthesize new information, and […]

ThreatConnect and Qualys Vulnerability Management Solution
Security Operations

ThreatConnect and Qualys Vulnerability Management Solution

The ThreatConnect and Qualys Vulnerability Management (VM) integration allows users to query Qualys scan results from within the ThreatConnect platform. Creates tasks, indicators, and attributes in ThreatConnect based on matching results automatically. Shows which machines are vulnerable to specific indicators, so one can pinpoint exactly where to take action. Together, ThreatConnect® and Qualys enable data-driven […]

ThreatConnect Palo Alto Networks Integration
Threat Intelligence Operations

ThreatConnect Palo Alto Networks Integration

ThreatConnect and Palo Alto Networks® have established a partnership to deliver validated threat intelligence to Palo Alto Networks next-generation firewalls, enabling security operations (SOC) teams to proactively protect their network from today’s sophisticated attacks. The joint solution ensures that customers can prioritize which threats are relevant to their organization. ThreatConnect threat intelligence provides the relevant […]