ThreatConnect Threat Intelligence Platform (TIP) Primary Use Case
The solution was used for publishing artefacts and threat intel data. We gathered data from the internet and uploaded it to the platform. It was integrated into every aspect of our cybersecurity network, like endpoints, SOC management, patch management, and vulnerability management tools.
View full review »SB
reviewer1480533
Vice President Global Technology Infrastructure Automation at a financial services firm with 10,001+ employees
I was doing research on this product by implementing a proof of concept.
It is used to help an operations team with the identification and resolution of threats in an automated, zero-touch fashion. Basically, it reduces the time to detect and repair any incident related to security.
It is the security operations people or security engineers who use it.
View full review »I use it mainly for investigation. I have found it really useful to track and map threat actors. It can be used for balloting as well.
View full review »Buyer's Guide
Threat Intelligence Platforms
April 2024
Find out what your peers are saying about ThreatConnect, ThreatQuotient, Anomali and others in Threat Intelligence Platforms. Updated: April 2024.
768,740 professionals have used our research since 2012.
NJ
reviewer1471347
Administrator at a university with 1,001-5,000 employees
I use ThreatConnect to see what threats are coming in. I also use it to look at threats in the community.
View full review »Buyer's Guide
Threat Intelligence Platforms
April 2024
Find out what your peers are saying about ThreatConnect, ThreatQuotient, Anomali and others in Threat Intelligence Platforms. Updated: April 2024.
768,740 professionals have used our research since 2012.