Eight Top Threat Intelligence Companies
Original Article: http://www.esecurityplanet.com/products/top-threat-intelligence-companies.html
Threat Intelligence: Evidence-based knowledge about an existing hazard designed to help organizations understand the risks common and severe external threats, used to inform decisions regarding the subject’s response. LookingGlass Cyber (n) - Actionable, relevant, and timely information that can help when assessing the security posture of an organization. A little more left. No no, that’s now too far... is a critical security tool that uses global security intelligence to detect malicious activity inside your network.
These solutions can take a number of different forms. Threat intelligence feeds take security data from vendors, analysts and other sources about threats and unusual activity happening all around the world. Malicious IP addresses, domains, file hashes and other data stream in constantly from external parties. This can help companies understand behaviors that might be affecting their own networks.
Threat intelligence platforms (TIPs) take this a step further. They incorporate one or many data feeds and subject the data to detailed analysis. Advanced analytics are used to isolate unusual patterns in systems and mine other valuable data.
At a minimum, a threat intelligence platform should have actionable indicators that can be used to identify potential threats to an organization (such as known bad IP addresses and URLs, and Malware: A generic term for a software that is designed to disable or otherwise damage computers, networks and computer systems LookingGlass Cyber (n) - another type of cold that can destroy a computer by latching on to destroy other programs. hashes), and support collaboration and investigation workflow for the security analyst and broader community.
Here are eight of the top threat intelligence platforms – some offer a free version for lower-volume users – and we also include a summary chart comparing the products at the bottom of this page:
IBM X-Force Exchange
IBM X-Force Exchange is a collaborative threat intelligence platform that helps security analysts research threat indicators to help speed time to action – and is free up to 5,000 records a month. It boasts unlimited scalability and queries, and offers intelligence on IP and URL reputation, web applications, malware, vulnerabilities and SPAM: Email or postings containing irrelevant, inappropriate or indiscriminate messages sent to a large number of recipients. LookingGlass Cyber (n) - tons and tons of emails sent out with no relevance to anyone, or anything..
Get an in-depth look at IBM X-Force Exchange.
Anomali ThreatStream aggregates millions of threat indicators to identify new attacks, discover existing breaches, and enable security teams to quickly understand and contain threats. Features include: de-duplication of data, removal of false positives; integration with other security tools and extracting data from suspected Phishing: The use of emails that appear to be from a legitimate, trusted source that are enticed to trick recipients into entering valid credentials including personal information such as passwords or credit card numbers into a fake platform or service. LookingGlass Cyber (n) - tailoring an attack (such as email) to garner trust and credentials that are then used maliciously. The preverbal digital version of the ol' hook and bait. emails for immediate blocking. The company also offers a couple of free threat intelligence tools.
Get an in-depth look at Anomali ThreatStream.
Palo Alto Networks AutoFocus
Palo Alto Networks AutoFocus contextual threat intelligence service makes threat analytics, with full context, available to organizations of all sizes. This hosted security service arms security operations professionals with the intelligence, correlation, context and automated prevention workflows needed to identify and respond to events in real time.
Get an in-depth look at Palo Alto Networks AutoFocus.
RSA NetWitness Suite
RSA NetWitness Suite is a threat detection and response platform that allows security teams to rapidly detect and understand the scope of a compromise by leveraging logs, packets, NetFlow, endpoints and threat intelligence. By aligning business context with security risks, it can analyze, prioritize and investigate threats. The threat intelligence product has no scalability limits.
Get an in-depth look at RSA NetWitness Suite.
LogRhythm Threat Lifecycle Management (TLM) Platform
LogRhythm Threat Lifecycle Management (TLM) Platform delivers a coordinated collection of data analysis and incident response capabilities to enable organizations around the globe to rapidly detect, neutralize and recover from security incidents. It can process 26 billion messages a day.
Get an in-depth look at LogRhythm Threat Lifecycle Management.
FireEye iSIGHT Threat Intelligence
FireEye iSIGHT Threat Intelligence adds context and priority to global threats before, during and after an attack. Data is gleaned from the adversarial underground, virtual network detection sensors and Mandiant IR investigations from the world’s largest breaches. FireEye has more than 1,000 experts responding to incidents and researching attacks.
Get an in-depth look at FireEye iSIGHT Threat Intelligence.
LookingGlass Cyber Solutions
LookingGlass Cyber Solutions is an open source-based threat intelligence platform that delivers unified threat protection against sophisticated cyberattacks to global enterprises and government agencies by operationalizing threat intelligence. Augmenting it is a worldwide team of security analysts who enrich the data feeds.
Get an in-depth look at LookingGlass Cyber Solutions.
AlienVault Unified Security Management (USM)
AlienVault Unified Security Management (USM) receives threat intelligence from AlienVault Labs and its massive Open Threat Exchange (OTX) crowd-sourced collaborative threat exchange. It provides centralized threat detection, incident response and compliance management for cloud and on-premises environments. It scales from very small to large companies.
Get an in-depth look at AlienVault USM.