threat intelligence delivered with threatconnect · get more than just a list of indicators ......

2
3865 Wilson Blvd. | Suite 550 | Arlington, VA 22203 [email protected] P: 1.800.965.2708 www.ThreatConnect.com Threat Intelligence Delivered with ThreatConnect Get More Than Just a List of Indicators TC Identify™ provides vetted, actionable threat intelligence compiled from our own ThreatConnect Research Team, more than 100 open source feeds, crowdsourced intelligence from within our dozens of communities, and the option to add intelligence from any of our TC Exchange™ partners. The intelligence leverages the full power of the ThreatConnect data model plus automated enrichments for robust analyst-curated context. Intelligence delivered within the ThreatConnect Platform tells the story behind the activity and shows how it is tied to other events in the Platform – providing the full picture, so you can make a confident decision on how to act. TC IDENTIFY REDUCE FALSE POSITIVES Enhance detection in your organization ö Easily send threat intel to your tools (like a SIEM or a firewall) as indicators of compromise and Yara rules ö Instantly see platform ratings, team votes, and observation count per indicator or incident ö View how often and how recently an indicator has been marked as a false positive AGGREGATE THREAT DATA All of your data in one place ö Combine your premium sources with 100+ OSINT feeds ö Add tags and attributes to segment your data for further analysis (for example, look at all data with a ‘APT’ or a ‘Fancy Bear’ tag) ö Create custom filters, write queries, and view observation counts on our Browse Screen ö Get analyst-curated threat intelligence from our in-house Research team – not just a list of indicators ö View their world-renowned research on events like the DNC Hack, the Anthem Breach, and more ö Access exclusive ThreatConnect Incidents containing information on targeted attacks and crimeware UNMASK ADVERSARIES Get access to our ThreatConnect Research Team ADVANCED PERSISTENT THREAT China SNORT Yara Russia Cve-2012-0158 Korea CRIMEWARE Phishing FLASH EITEST Ransomware Banking DEFENSE PlugX INDIA SOFACY Japan Rig NAIKON FANCY BEAR APT28 MIDDLE EAST PAWN STORM HONG KONG ENERGY TAIWAN Sednit MILITARY Request Demonstration Today

Upload: others

Post on 30-Aug-2020

4 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Threat Intelligence Delivered with ThreatConnect · Get More Than Just a List of Indicators ... providing the full picture, so you can make a confident decision on how to act

3865 Wilson Blvd. | Suite 550 | Arlington, VA [email protected] P: 1.800.965.2708 www.ThreatConnect.com

Threat Intelligence Delivered with ThreatConnect

Get More Than Just a List of Indicators

TC Identify™ provides vetted, actionable threat intelligence compiled from our own ThreatConnect Research Team, more than 100 open source feeds, crowdsourced intelligence from within our dozens of communities, and the option to add intelligence from any of our TC Exchange™ partners. The intelligence leverages the full power of the ThreatConnect data model plus automated enrichments for robust analyst-curated context. Intelligence delivered within the ThreatConnect Platform tells the story behind the activity and shows how it is tied to other events in the Platform – providing the full picture, so you can make a confident decision on how to act.

TC IDENTIFY™

REDUCE FALSE POSITIVESEnhance detection in your organization

öö Easily send threat intel to your tools (like a SIEM or a firewall) as indicators of compromise and Yara rules

öö Instantly see platform ratings, team votes, and observation count per indicator or incident

öö View how often and how recently an indicator has been marked as a false positive

AGGREGATE THREAT DATAAll of your data in one place

öö Combine your premium sources with 100+ OSINT feeds

öö Add tags and attributes to segment your data for further analysis (for example, look at all data with a ‘APT’ or a ‘Fancy Bear’ tag)

öö Create custom filters, write queries, and view observation counts on our Browse Screen

öö Get analyst-curated threat intelligence from our in-house Research team – not just a list of indicators

öö View their world-renowned research on events like the DNC Hack, the Anthem Breach, and more

öö Access exclusive ThreatConnect Incidents containing information on targeted attacks and crimeware

UNMASK ADVERSARIESGet access to our ThreatConnect Research Team ADVANCED

PERSISTENTTHREAT

China

SNORT

Yara

RussiaCve-2012-0158

Korea

CRIMEWARE

Phishing

FLA

SH

EIT

ES

T

Ransomware

BankingDE

FE

NS

E

Plu

gX

IND

IA

SOFACY

Jap

an

Rig

NA

IKO

N

FANCY BEAR

APT28

MIDDLE EAST

PA

WN

S

TO

RM

HONG KONG

ENERGY

TAIWAN

Se

dn

it

MILITARY

Request Demonstration Today

Page 2: Threat Intelligence Delivered with ThreatConnect · Get More Than Just a List of Indicators ... providing the full picture, so you can make a confident decision on how to act

3865 Wilson Blvd. | Suite 550 | Arlington, VA [email protected] P: 1.800.965.2708

About ThreatConnect®

ThreatConnect arms organizations with a powerful defense against cyber threats and the confidence to make strategic business decisions. Built on the industry ’s only intelligence-driven, extensible security platform, ThreatConnect provides a suite of products designed to meet the threat intelligence aggregation, analysis and automation needs of security teams at any maturity level. More than 1,600 companies and agencies worldwide deploy the ThreatConnect platform to fully integrate their security technologies, teams, and processes with relevant threat intelligence resulting in reduced detection to response time and enhanced asset protection.

www.ThreatConnect.com© 2018 ThreatConnect, Inc. All Rights Reserved.

WHY THREATCONNECT?

Threat Intelligence for Any Maturity Level

Find Threats, Evaluate Risk, and Mitigate Harm to Your Organization

We know security operations and threat intelligence are not one size fits all. That’s why we offer a suite of products designed for teams of all sizes and maturity levels. And because each of our products is built on our fully extensible Platform, ThreatConnect will adapt to your organization as it grows and changes.

ThreatConnect Platform

Maturity Paths

THREATCONNECT PRODUCTS

TC Identify TC Manage TC Analyze TC Complete

Open Source Feeds

Ingest Premium Feeds

Access to CAL™ Data

TAXII Server

ThreatConnect Intelligence Source A la carte A la carte A la carte

Custom Dashboards Default Dashboards

Automated Email Import

Manage Incidents and Tasks

Create Threat Intelligence

Create Private Communities

Orchestration Feature

Custom Indicator Types

Request a Demonstration Today