Skip to main content

Explore Featured Resources

Showing 292 resources items
Sort

No Results Match Your Search

Please try again or contact marketing@threatconnect.com for more information on our resources.

ThreatConnect McAfee Enterprise Security Manager Integration
Threat Intelligence Operations

ThreatConnect McAfee Enterprise Security Manager Integration

ThreatConnect™ and McAfee® have partnered to enable users to detect and act on ThreatConnect intelligence in McAfee Enterprise Security Manager™. This integration allows users to combine validated Threat Intelligence in ThreatConnect with their aggregated internal logs from McAfee ESM. Users can spot trends or patterns that are out of the ordinary and act on them […]

ThreatConnect and Accenture DeepSight Intelligence
Threat Intelligence Operations

ThreatConnect and Accenture DeepSight Intelligence

The new ThreatConnect® and Accenture integration enables users to collect and act on Accenture™ Cyber Security Services: DeepSight Intelligence in the ThreatConnect platform. This partnership allows users to ingest DeepSight Intelligence Advanced IP and URL Reputation feeds into ThreatConnect, so they can act on this intelligence in their network.

Fragmentation: The “Silent Killer” of Your Security Management Program
Security Operations

Fragmentation: The “Silent Killer” of Your Security Management Program

Extreme fragmentation of enterprise security people, processes, and technologies is contributing to the “Detection Deficit” between attackers and defenders reaching an all-time high and trending wider. In this paper we’ll take a look at the issues and lay out a path toward better security through better unity.

Threat Intelligence Operations

ThreatConnect Overview and DomainTools Integration

Using DomainTools’ branded Reverse Whois and Registrant Alert services in ThreatConnect’s Track feature, ThreatConnect customers are able to research malicious domain registrants from the industry’s longest running and most comprehensive searchable database of domain name registration and hosting data. DomainTools and ThreatConnect offer users the best DNS based threat intelligence capability on the market.

Applying Threat Intelligence to the Star Wars’ Battle of Yavin
Threat Intelligence Operations

Applying Threat Intelligence to the Star Wars’ Battle of Yavin

If the Empire had been able to make sense of the intelligence they were gathering and had been able to connect the dots to reveal contextual information, they could have prevented their own demise, and stopped a decades-long saga from unfolding.

Threat Intelligence Operations

The Business Case for Threat Intelligence

Take 30 minutes of your time to hear ThreatConnect, Inc. CEO Adam Vincent review the need for businesses to evaluate the cost of a sophisticated threat intelligence program. Learn more about the ROI calculator that evaluates cost/benefits of threat intelligence investments and offers quantifiable financial benefits and use-cases to demonstrate the overall costs associated with data […]

ThreatConnect For Managed Security Service Providers
ThreatConnect Platform

ThreatConnect For Managed Security Service Providers

MSSPs offer protection that many businesses simply can’t live without. With ThreatConnect, you can deliver even more value. ThreatConnect partners with MSSPs worldwide to use threat intelligence to improve and enhance the security and quality of service that providers offer to their clients. Many MSSPs integrate the ThreatConnect platform into their organization’s operations and into […]

Threat Intelligence Operations

Decoding Threat Intelligence

Watch Rick Holland, principal security and risk analyst for Forrester Research, and Adam Vincent, CEO of ThreatConnect, lead “Decoding Threat Intelligence.”

ThreatConnect and Cofense Intelligence
Threat Intelligence Operations

ThreatConnect and Cofense Intelligence

Cofense Intelligence andThreatConnect deliver the ability to acquire, aggregate and take action from phishing-specific machine-readable threat intelligence (MRTI). Using high fidelity phishing intelligence means that analysts can prioritize and decisively respond to alerts from intelligence consumed via Cofense’s API. With ThreatConnect, security teams are able to take action based on Cofense Intelligence indicators through their existing infrastructure to […]

ThreatConnect and Arcsight Joint Solution Brief
Threat Intelligence Operations

ThreatConnect and Arcsight Joint Solution Brief

ThreatConnect® and Micro Focus have partnered to enable users to detect and act on ThreatConnect intelligence in ArcSight Enterprise Security Management (ESM)™. This integration allows users to combine validated Threat Intelligence in ThreatConnect with their aggregated internal logs from ArcSight ESM. Users can easily spot trends or patterns that are out of the ordinary and act […]

Project CameraShy Closing The Aperture On China’s Unit 78020
ThreatConnect Platform

Project CameraShy Closing The Aperture On China’s Unit 78020

China is aggressively claiming territory deeper into the South China Sea, threatening economic and political stability in the Southeast Asia and beyond. The territorial activity is accompanied by high-tempo cyber espionage and malware attacks, malicious attachments and spear phishing, directed at Southeast Asian military, diplomatic, and economic targets. ThreatConnect®, in partnership with Defense Group Inc., […]

Threat Intelligence Platforms
Threat Intelligence Operations

Threat Intelligence Platforms

Everything you’ve ever wanted to know but didn’t know to ask Today’s threat environment is complex and dynamic. The internet was built for connectivity, not security, and approaches such as intrusion detection systems, anti-virus programs, and traditional incident response methodologies by themselves are no longer sufficient in the face of the widening gap between offensive […]