The holiday season's spirit is in the air. It pervades open spaces and buildings. Just like hackers. Add business value to your actionable intelligence with EclecticIQ Fusion Center Intelligence Essentials reports and feeds.
EclecticIQ Fusion Center Intelligence Essentials allows organizations of any size to jump-start their Cyber Threat Intelligence (CTI) practices without compromising on quality.
The veteran analysts working at EclecticIQ's Fusion Center offer human-qualified intelligence based on 50+ open-sources, and a selection of commercial sources (including Redsocks, SenseCy, and Verint) in a single feed, focusing on generic threats to any enterprise.
The feed consists of HTML reports for human consumption targeting any stakeholder in an organization. It also includes a structured intelligence feed (in STIX and EclecticIQ JSON format) and malicious IOCs and IOAs feeds (in various formats) allowing automated feeding to downstream security controls such as SIEMs. Get a recent sample report with related STIX entities (Additional Analysis on APT34 Activities and Potential Crossovers to Other Iranian Groups).
EclecticIQ Fusion Center Intelligence Essentials is offered as an online subscription that includes support and various configuration options.
Correct! Read Why businesses don’t yet need to panic about Krack on SC Magazine.
Nope... Try again.
EclecticIQ successfully completed a Series-B investment that raised €14 million.
The investment round was led by Keen Ventures Partners, with the participation of existing investors. It follows a Series-A investment in May 2016 of €5.5 million led by INKEF, with KPN Ventures also participating. Investment in EclecticIQ now totals over €20 million.
The Series-B investment makes EclecticIQ one of the best-funded cyber security scale-ups in Europe. It will lead to accelerated expansion of our workforce, with a focus on expanding our portfolio of technologies, and the capabilities of our Fusion Center offering.
This paper explains how Threat Intelligence improves Incident Response (IR) and how to introduce Threat Intelligence into your IR practice - with two use cases from Fox-IT.
Learn about the limitations of automation in the Security Operations Center. Find out why SOCs should let humans take the lead in handling intelligence. Discover how to achieve the benefits of an integrated, intelligence-led cyber defense capability powered by a Threat Intelligence Platform.