ThreatConnect Threat Intelligence Platform (TIP) Primary Use Case

Sai-Charan - PeerSpot reviewer
Information Technology Security Specialist at LTIMindtree

The solution was used for publishing artefacts and threat intel data. We gathered data from the internet and uploaded it to the platform. It was integrated into every aspect of our cybersecurity network, like endpoints, SOC management, patch management, and vulnerability management tools.

View full review »
SB
Vice President Global Technology Infrastructure Automation at a financial services firm with 10,001+ employees

I was doing research on this product by implementing a proof of concept.

It is used to help an operations team with the identification and resolution of threats in an automated, zero-touch fashion. Basically, it reduces the time to detect and repair any incident related to security. 

It is the security operations people or security engineers who use it.

View full review »
Nicolo Corrado - PeerSpot reviewer
Consulente immobiliare at Libero

I use it mainly for investigation. I have found it really useful to track and map threat actors. It can be used for balloting as well.

View full review »
Buyer's Guide
Threat Intelligence Platforms
April 2024
Find out what your peers are saying about ThreatConnect, ThreatQuotient, Anomali and others in Threat Intelligence Platforms. Updated: April 2024.
768,740 professionals have used our research since 2012.
NJ
Administrator at a university with 1,001-5,000 employees

I use ThreatConnect to see what threats are coming in. I also use it to look at threats in the community. 

View full review »
Buyer's Guide
Threat Intelligence Platforms
April 2024
Find out what your peers are saying about ThreatConnect, ThreatQuotient, Anomali and others in Threat Intelligence Platforms. Updated: April 2024.
768,740 professionals have used our research since 2012.