Case Studies

Learn how our customers are using ThreatConnect to collect, analyze, and enrich their threat intelligence data.

Customer Success Story: Packaged Goods Leader Takes Automated Cyber Risk Quantification Global
Find out how ThreatConnect: Helped a customer cut out the long, laborious, and manual effort of gathering and tabulating data in Excel spreadsheets and using business intelligence to produce results they could count on. Delivered results for more than 250 applications and 30 separate legal entities in less than 90 days. Established meaningful conversations with […]
Customer Success Story: Packaged Goods Leader Takes Automated Cyber Risk Quantification Global
Find out how ThreatConnect: Helped a customer cut out the…
A ThreatConnect Customer Success Story: Establishing a Strong Partnership to Ensure Continued Success
Find out how ThreatConnect: Helped a customer set up and…
A ThreatConnect Customer Success Story: Creating an Efficient Reporting Workflow To and From the Security Operations Center
Find out how ThreatConnect helped a customer: Establish…
A ThreatConnect Success Story: Automating the Process of Blocking Malicious Indicators with Playbooks
Find out how ThreatConnect helped a customer: Quickly build…
ThreatConnect Customer Success Story Identifying Additional Insights on Cyber Adversaries
A ThreatConnect Success Story: Identifying Additional Insights on Cyber Adversaries
Find out how ThreatConnect helped a customer: Validate their…
A ThreatConnect Success Story: Using Automation to Collaborate with Partners
Learn how ThreatConnect solved these problems for a customer: …
A ThreatConnect Success Story: Upgrading from an Open Source TI Database
Find out how ThreatConnect helped a customer meet these objectives: …
A ThreatConnect Success Story: Focusing on Relevant Intelligence
Learn how ThreatConnect solved these problems for a customer: …
A ThreatConnect Success Story: Automating Analytical Processes
Learn how ThreatConnect solved these problems for a customer: …
ISAC and ISAO Edition Case Study
This case study illustrates how a Cyber Threat Response…
ThreatConnect Enriches Data Case Study
This case study illustrates how an organization utilizing ThreatConnect…