-
Accenture
Integration Partner
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'Accenture (Integration Partner)' }) }});"> More infoAccenture
Integration Partner
Accenture CTI—one of the world’s largest cybersecurity services providers—leverages its network of global Security Operations Centers and over 7,500 security professionals to develop a nuanced understanding of threats and vulnerabilities at a global level. Our intelligence teams then distill focused insights from that body of knowledge and leverage our integration with EclecticIQ to inject those insights directly into our customers’ operations to deliver improved security outcomes.
-
Accenture CTI Threat Feed
Technology Integration
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'Accenture CTI Threat Feed (Technology Integration)' }) }});"> More infoAccenture CTI Threat Feed
Technology Integration
The Accenture CTI Threat Feed is a highly refined, human-curated, intelligence source that provides insight on the latest threats with an exceptionally low false-positive ratio. Coupled with Accenture’s world-class cybersecurity services, our CTI Threat Feed will help your teams to achieve more than just “cyber security”; they will help you achieve cyber resilience.
-
AlienVault
Integration Partner
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'AlienVault (Integration Partner)' }) }});"> More info -
AlienVault Open Threat Exchange
Technology Integration
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'AlienVault Open Threat Exchange (Technology Integration)' }) }});"> More info -
Amazon
Integration Partner
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'Amazon (Integration Partner)' }) }});"> More infoAmazon
Integration Partner
Amazon Simple Storage Service (Amazon S3) is an object storage service that offers industry-leading scalability, data availability, security, and performance. This means customers of all sizes and industries can use it to store and protect any amount of data for a range of use cases, such as websites, mobile applications, backup and restore, archive, enterprise applications, IoT devices, and big data analytics. Amazon S3 provides easy-to-use management features so you can organize your data and configure finely-tuned access controls to meet your specific business, organizational, and compliance requirements. Amazon S3 is designed for 99.999999999% (11 9's) of durability, and stores data for millions of applications for companies all around the world.
-
Amazon S3
Technology Integration
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'Amazon S3 (Technology Integration)' }) }});"> More infoAmazon S3
Technology Integration
Amazon Simple Storage Service (Amazon S3) is an object storage service that offers industry-leading scalability, data availability, security, and performance. This means customers of all sizes and industries can use it to store and protect any amount of data for a range of use cases, such as websites, mobile applications, backup and restore, archive, enterprise applications, IoT devices, and big data analytics. Amazon S3 provides easy-to-use management features so you can organize your data and configure finely-tuned access controls to meet your specific business, organizational, and compliance requirements. Amazon S3 is designed for 99.999999999% (11 9's) of durability, and stores data for millions of applications for companies all around the world.
-
Applied Cyber Defense Systems
Managed Service Partner
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'Applied Cyber Defense Systems (Managed Service Partner)' }) }});"> More infoApplied Cyber Defense Systems
Managed Service Partner
RELENTLESS DEFENSES We adapt to protect businesses from cyberattacks with sophisticated cybersecurity solutions. Our philosophy is simple. It takes a good hacker to beat a malicious one. In order to understand and defend against attacks, we need to think like they do. Our next-gen security mechanisms are supported by Intercept, engineered by ACDS, to deliver some of the most sophisticated defenses in the world – without compromise! 77% of companies do not have an incident response plan in place, and we believe that every company should be afforded the best possible protection against cybercriminals who intend to destabilize your business or success.
-
ASM Technologies
Managed Service Partner
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'ASM Technologies (Managed Service Partner)' }) }});"> More infoASM Technologies
Managed Service Partner
Established in 1992, ASM Technologies Limited is a publicly-listed company in India with a global presence in the USA, Singapore, UK, Canada, Mexico, and Japan. With over two decades of experience, ASM has been providing world-class consulting and product development services in the areas of Engineering Services and Product R&D with successful Offshore Development & Support Centers in India and Overseas for its global clientele.
-
Atkins
Commercial Partner
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'Atkins (Commercial Partner)' }) }});"> More infoAtkins
Commercial Partner
Atkins is one of the world’s most respected design, engineering and project management consultancies. We build long-term trusted partnerships to create a world where lives are enriched through the implementation of our ideas. On July 3, 2017, Atkins was acquired by SNC-Lavalin. Founded in 1911, SNC-Lavalin is a global, fully integrated professional services and project management company and a major player in the ownership of infrastructure. The combined entity of Atkins and SNC-Lavalin has created one of the largest global engineering and project management consultancies with approximately 50,000 employees and operating across 50 countries.
-
Binary Defense Artillery
Technology Integration
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'Binary Defense Artillery (Technology Integration)' }) }});"> More info -
Bitdefender
Integration Partner
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'Bitdefender (Integration Partner)' }) }});"> More infoBitdefender
Integration Partner
The Bitdefender Advanced Threat Intelligence solution helps security professionals gain visibility into the latest threats by using up-to-date, contextual intelligence on URLs, IPs, domains, certificates, files, Command and Control servers and Advanced Persistent Threats.
-
BitDefender
Technology Integration
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'BitDefender (Technology Integration)' }) }});"> More infoBitDefender
Technology Integration
The Bitdefender Advanced Threat Intelligence solution helps security professionals gain visibility into the latest threats by using up-to-date, contextual intelligence on URLs, IPs, domains, certificates, files, Command and Control servers and Advanced Persistent Threats.
-
BitSight
Integration Partner
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'BitSight (Integration Partner)' }) }});"> More info -
Blu5
Commercial Partner
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'Blu5 (Commercial Partner)' }) }});"> More infoBlu5
Commercial Partner
Blu5 takes pride in supporting digitisation teams in the challenge to reduce surface of attack, while securing core critical operations. We engineer hardware and software to address the needs of Critical Infrastructures, IoT, FinTech, BioMedical, Space & Defence. Since foundation in 2007, the Blu5 R&D team, rich of 40+ patents, has been the key enabler for generating innovative solutions.
-
Broadcom
Integration Partner
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'Broadcom (Integration Partner)' }) }});"> More infoBroadcom
Integration Partner
Leveraging the extensive Symantec Global Intelligence Network, this integration feed allows users to collect raw intelligence data making it available within EclecticIQ Platform. The feed provides a broad range of insights, covering reputation and threat intelligence data for IP, URLs, attacks, bots, cnc, malware, fraud, and phishing.
-
CAPEC - Common Attack Pattern Enumeration and Classification
Technology Integration
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'CAPEC - Common Attack Pattern Enumeration and Classification (Technology Integration)' }) }});"> More infoCAPEC - Common Attack Pattern Enumeration and Classification
Technology Integration
Understanding how the adversary operates is essential to effective cyber security. CAPEC™ helps by providing a comprehensive dictionary of known patterns of attack employed by adversaries to exploit known weaknesses in cyber-enabled capabilities. It can be used by analysts, developers, testers, and educators to advance community understanding and enhance defenses.
-
Centralpoint Nederland
Commercial Partner
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'Centralpoint Nederland (Commercial Partner)' }) }});"> More infoCentralpoint Nederland
Commercial Partner
Centralpoint is de grootste merkonafhankelijke IT-leverancier van de Benelux en specialist in IT-oplossingen voor organisaties, klein en groot. Wij zijn professionals voor professionals en zorgen dat je altijd en overal zorgeloos kunt werken met de beste technologie. Voor elk IT-vraagstuk hebben we een concrete oplossing. We houden het eenvoudig en creëren duidelijkheid bij complexe IT-uitdagingen. Of dat nu gaat om beveiliging, dataopslag, connectiviteit, mobiel werken, beheer of onderhoud en logistiek. Wij doen alleen waar we goed in zijn, zodat jij kan doen waar jij goed in bent. Wij krijgen energie van IT en zorgen ervoor dat het werkt zoals het hoort. Onze 550 medewerkers in Nederland en België staan altijd voor je klaar!
-
CIRCL - Computer Incident Response Center Luxembourg
Integration Partner
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'CIRCL - Computer Incident Response Center Luxembourg (Integration Partner)' }) }});"> More infoCIRCL - Computer Incident Response Center Luxembourg
Integration Partner
CIRCL Passive SSL is a database storing historical X.509 certificates seen per IP address. The Passive SSL historical data is indexed per IP address, which makes it searchable for incident handlers, security analysts or researchers. The Passive SSL enricher will retrieve domains and IP’s associated with an SSL Certificate hash.
-
CIRCL Passive SSL
Technology Integration
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'CIRCL Passive SSL (Technology Integration)' }) }});"> More infoCIRCL Passive SSL
Technology Integration
CIRCL Passive SSL is a database storing historical X.509 certificates seen per IP address. The Passive SSL historical data is indexed per IP address, which makes it searchable for incident handlers, security analysts or researchers. The Passive SSL enricher will retrieve domains and IP’s associated with an SSL Certificate hash.
-
Cisco
Integration Partner
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'Cisco (Integration Partner)' }) }});"> More infoCisco
Integration Partner
The Cisco Umbrella API helps analysts quickly understand registration details, similar domains and potential malicious ties to observable data. With this integration, analysts can quickly discern threats and attribution intelligence from observables used in active campaigns as the cloud-based enricher provides information relating domains, IP addresses and file hashes. Combining this integration with EclecticIQ Platform enables analysts to dynamically build a repository of intelligence relating to domain activity.
-
Cisco OpenDNS / OpenResolve
Technology Integration
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'Cisco OpenDNS / OpenResolve (Technology Integration)' }) }});"> More infoCisco OpenDNS / OpenResolve
Technology Integration
Take faster action on newly discovered malicious domains by leveraging a turn-key integration between Cisco and OpenDNS. Through security automation, dwell time is reduced from hours or days to only minutes. And by gaining Internet-wide visibility in real-time, you will discover more compromised systems.
-
Cisco Threat Grid
Technology Integration
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'Cisco Threat Grid (Technology Integration)' }) }});"> More infoCisco Threat Grid
Technology Integration
Cisco Threat Grid analyzes suspicious behavior in your network against more than 450 behavioral indicators and a malware knowledge base sourced from around the world. Threat Grid content feeds are pre-generated, curated sets of behavioural indicators that are produced in the Threat Grid Cloud infrastructure from sample analysis results. Feeds are used by organizations and partners for targeted threat intelligence, by focusing on the specific types of threats faced by particular industries.
-
Cisco Umbrella
Technology Integration
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'Cisco Umbrella (Technology Integration)' }) }});"> More infoCisco Umbrella
Technology Integration
The Cisco Umbrella API helps analysts quickly understand registration details, similar domains and potential malicious ties to observable data. With this integration, analysts can quickly discern threats and attribution intelligence from observables used in active campaigns as the cloud-based enricher provides information relating domains, IP addresses and file hashes. Combining this integration with EclecticIQ Platform enables analysts to dynamically build a repository of intelligence relating to domain activity.
-
Cofense
Integration Partner
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'Cofense (Integration Partner)' }) }});"> More infoCofense
Integration Partner
Cofense PhishMe is the leading provider of human-driven phishing defense solutions worldwide. Our collective defense suite combines best-in class incident response technologies with timely attack intelligence sourced from employees. Cofense enables thousands of global organizations to stop attacks in progress faster and stay ahead of breaches.
-
Cofense PhishMe
Technology Integration
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'Cofense PhishMe (Technology Integration)' }) }});"> More infoCofense PhishMe
Technology Integration
Cofense PhishMe is the leading provider of human-driven phishing defense solutions worldwide. Our collective defense suite combines best-in class incident response technologies with timely attack intelligence sourced from employees. Cofense enables thousands of global organizations to stop attacks in progress faster and stay ahead of breaches.
-
Cognyte
Integration Partner
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'Cognyte (Integration Partner)' }) }});"> More info -
Common Vulnerabilities and Exposures (CVE)
Technology Integration
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'Common Vulnerabilities and Exposures (CVE) (Technology Integration)' }) }});"> More infoCommon Vulnerabilities and Exposures (CVE)
Technology Integration
Enrich intelligence with exploit target information, from the standard source of vulnerabilities and exposures: the MITRE corporation. The enricher and feed uses the Computer Incident Response Center Luxembourg (CIRCL) cve-search API to retrieve all the available details.
-
Consortium Networks
Commercial Partner
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'Consortium Networks (Commercial Partner)' }) }});"> More infoConsortium Networks
Commercial Partner
We educate and connect the IT security community through the power of people and crowdsourced threat intelligence. Consortium Networks is committed to providing businesses with the most relevant, up-to-date technology information, with a focus on cybersecurity. By connecting technology customers, vendors, and experts, we strive to be the go-to resource for guidance regarding all your IT requirements. We are the first organization dedicated to providing real-world feedback and data on solutions in operation in production environments at peer organizations.
-
Cosive
Commercial Partner
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'Cosive (Commercial Partner)' }) }});"> More info -
CrowdStrike
Integration Partner
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'CrowdStrike (Integration Partner)' }) }});"> More infoCrowdStrike
Integration Partner
CrowdStrike® Falcon Insight™ eliminates silent failure by providing the highest level of real-time monitoring capabilities that span across detection, response and forensics. This ensures nothing is missed, leaving attackers with no place to hide. Falcon Insight provides organizations with state-of-the-art endpoint detection and response (EDR), following an approach recommended by top analyst firms such as Gartner.
-
CrowdStrike Falcon Insight / EDR
Technology Integration
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'CrowdStrike Falcon Insight / EDR (Technology Integration)' }) }});"> More infoCrowdStrike Falcon Insight / EDR
Technology Integration
CrowdStrike® Falcon Insight™ eliminates silent failure by providing the highest level of real-time monitoring capabilities that span across detection, response and forensics. This ensures nothing is missed, leaving attackers with no place to hide. Falcon Insight provides organizations with state-of-the-art endpoint detection and response (EDR), following an approach recommended by top analyst firms such as Gartner.
-
Crowdstrike Falcon Intelligence
Technology Integration
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'Crowdstrike Falcon Intelligence (Technology Integration)' }) }});"> More infoCrowdstrike Falcon Intelligence
Technology Integration
Crowdstrike is a global leader in the cloud-delivered next-generation endpoint protection. With a single lightweight agent, CrowdStrike is the first company to unify next-generation antivirus that includes machine learning and behavioral analytics, endpoint detection and response (EDR), and a 24/7 managed hunting service all in one lightweight agent. Falcon Intelligence TM is a cost-effective program tailored to each company’s needs and requirements and addresses the legal and technical aspects of preventing harm that results from a cyberattack.
-
CyberCrime Tracker
Technology Integration
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'CyberCrime Tracker (Technology Integration)' }) }});"> More info -
Cybereason
Integration Partner
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'Cybereason (Integration Partner)' }) }});"> More info -
Cybereason Endpoint Detection and Response (EDR)
Technology Integration
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'Cybereason Endpoint Detection and Response (EDR) (Technology Integration)' }) }});"> More info -
CyberKnight
Commercial Partner
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'CyberKnight (Commercial Partner)' }) }});"> More infoCyberKnight
Commercial Partner
CyberKnight Technologies is a cybersecurity focused value-added-distributor (VAD) covering the Middle East with on-the-ground presence in all key regional markets. Our ZTX (Zero Trust Security) methodology, based on the Forrester framework, incorporates emerging and market-leading cybersecurity solutions that protect the entire attack surface, by leveraging AI, threat intelligence and collective defense. CyberKnight helps security and risk teams at enterprise and government customers simplify breach detection, prevention and incident response, while addressing regulatory compliance. CyberKnight's Art of Cybersecurity Distribution methodology enables strategic partners to achieve greater market penetration, return-on-investment and time-to-value.
-
D3 Intelligence
Integration Partner
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'D3 Intelligence (Integration Partner)' }) }});"> More info -
DeepCyber
Commercial Partner
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'DeepCyber (Commercial Partner)' }) }});"> More infoDeepCyber
Commercial Partner
DeepCyber supports its customers, with an “intelligence-driven” approach, to improve their proactive detection and response "capability" of cyber threats. It is specialized in Advanced Intelligence (surface, deep and dark web), Protection and Antifraud, using a methodology oriented to "data fusion".
-
Deloitte Risk Advisory (Italy)
Commercial Partner
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'Deloitte Risk Advisory (Italy) (Commercial Partner)' }) }});"> More infoDeloitte Risk Advisory (Italy)
Commercial Partner
Deloitte’s Cyber Intelligence Centre (CIC) has been established to be your go to resource for cyber support. We offer a broad range of cyber and managed services to help you tackle the ever changing risk landscape. Whether it’s threat monitoring, threat intelligence, data protection, incident response and more, our team of specialists can help.
-
Devo
Integration Partner
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'Devo (Integration Partner)' }) }});"> More info -
Devoteam
Commercial Partner
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'Devoteam (Commercial Partner)' }) }});"> More info -
Digital Shadows
Integration Partner
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'Digital Shadows (Integration Partner)' }) }});"> More info -
Digital Shadows SearchLight
Technology Integration
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'Digital Shadows SearchLight (Technology Integration)' }) }});"> More info -
DomainTools
Integration Partner
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'DomainTools (Integration Partner)' }) }});"> More infoDomainTools
Integration Partner
DomainTools helps security analysts turn threat data into threat intelligence. We take indicators from your network and connect them with nearly every active domain on the Internet. Fortune 1000 companies, global government agencies, and leading security solution vendors use the DomainTools platform as a critical ingredient in their threat investigation and mitigation work.
-
DomainTools
Technology Integration
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'DomainTools (Technology Integration)' }) }});"> More infoDomainTools
Technology Integration
DomainTools helps security analysts turn threat data into threat intelligence. We take indicators from your network and connect them with nearly every active domain on the Internet. Fortune 1000 companies, global government agencies, and leading security solution vendors use the DomainTools platform as a critical ingredient in their threat investigation and mitigation work.
-
DomainTools Domain Profile
Technology Integration
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'DomainTools Domain Profile (Technology Integration)' }) }});"> More infoDomainTools Domain Profile
Technology Integration
DomainTools helps security analysts turn threat data into threat intelligence. We take indicators from your network and connect them with nearly every active domain on the Internet. Fortune 1000 companies, global government agencies, and leading security solution vendors use the DomainTools platform as a critical ingredient in their threat investigation and mitigation work.
-
DomainTools Reverse IP Whois
Technology Integration
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'DomainTools Reverse IP Whois (Technology Integration)' }) }});"> More infoDomainTools Reverse IP Whois
Technology Integration
The Whois Lookup API provides the ownership record for a domain name or IP address with basic registration details. The API is optimized to respond quickly and is designed to handle a high volume of parallel requests. This is the ideal product to use if you have a busy web site or a long list of domains that you need to process.
-
Dragos
Integration Partner
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'Dragos (Integration Partner)' }) }});"> More infoDragos
Integration Partner
As a leading provider of industrial control systems cybersecurity, the Dragos threat detection and response platform codifies decades of real-world experience in advanced threat analytics. It provides operational and information technology practitioners unprecedented visibility and prescriptive procedures to respond to adversaries in the industrial threat landscape. Through the integration with EclecticIQ Platform, Threat Intelligence Analysts now have access to relevant reports, Indicators, Threat Actors, TTPs and observables that Dragos provides for this unique threat landscape.
-
Dragos
Technology Integration
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'Dragos (Technology Integration)' }) }});"> More infoDragos
Technology Integration
As a leading provider of industrial control systems cybersecurity, the Dragos threat detection and response platform codifies decades of real-world experience in advanced threat analytics. It provides operational and information technology practitioners unprecedented visibility and prescriptive procedures to respond to adversaries in the industrial threat landscape. Through the integration with EclecticIQ Platform, Threat Intelligence Analysts now have access to relevant reports, Indicators, Threat Actors, TTPs and observables that Dragos provides for this unique threat landscape.
-
DShield
Technology Integration
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'DShield (Technology Integration)' }) }});"> More infoDShield
Technology Integration
DShield provides a platform for users of firewalls and intrusion detection systems to share intrusion information. This data is cataloged and summarized and can be used to discover trends in activity, confirm widespread attacks. This data is accessable through the Internet Storm Center/DShield REST API. DShield is a free and open service.
-
EclecticIQ Browser Extension
Technology Integration
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'EclecticIQ Browser Extension (Technology Integration)' }) }});"> More infoEclecticIQ Browser Extension
Technology Integration
The Browser Extension is an add-on for your web browser, specifically made for EclecticIQ Platform. It lets analysts quickly and easily process both external threat data found in human-written reports and machine-generated data from internal security controls. Analysts can capture the data, structure it and subsequently ingest it into their Platform in one flow, without ever leaving the page they are on.
-
EclecticIQ Custom Integrations
Technology Integration
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'EclecticIQ Custom Integrations (Technology Integration)' }) }});"> More infoEclecticIQ Custom Integrations
Technology Integration
Besides the integrations listed above, organizations can configure their own custom integration based on the following standards: ArcSight CEF, EclecticIQ CSV, EclecticIQ JSON, Email (IMAP), File system, FTP Push, HTTP Download, STIX 1.2, Syslog (UDP/TCP), TAXII (Poll/Push), Plain text (e.g. Snort Rules, Yara Signatures)
-
EclecticIQ FortiSOAR connector
Technology Integration
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'EclecticIQ FortiSOAR connector (Technology Integration)' }) }});"> More infoEclecticIQ FortiSOAR connector
Technology Integration
The EclecticIQ FortiSOAR connector, facilitates automated interactions, with the EclecticIQ platform using FortiSOAR playbooks. Add the EclecticIQ connector as a step in FortiSOAR playbooks and perform automated operations, such as retrieving reputations of domains, URLs, IP addresses, etc., from EclecticIQ, querying the EclecticIQ platform for entities, and creating sighting in the EclecticIQ platform.
-
EclecticIQ Security Controls
Technology Integration
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'EclecticIQ Security Controls (Technology Integration)' }) }});"> More info -
EclecticIQ STIX-formatted data
Technology Integration
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'EclecticIQ STIX-formatted data (Technology Integration)' }) }});"> More info -
Elemendar
Integration Partner
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'Elemendar (Integration Partner)' }) }});"> More infoElemendar
Integration Partner
Elemendar was founded in 2017 by Giorgos Georgopoulos and Syra Marshall at the UK’s first GCHQ/NCSC Cyber Accelerator. Their mission is to automate the processing of cyber threat intelligence to better defend organisations against cyber threats. Elemendar work with a number of world-class industry collaborators including governments, enterprise, defence organisations and the Laboratory for Analytic Sciences (LAS).
-
Elemendar READ
Technology Integration
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'Elemendar READ (Technology Integration)' }) }});"> More infoElemendar READ
Technology Integration
READ. processes human-authored, unstructured CTI reports into structured CTI data. This machine-readable data can then be fed directly into a TIP or defensive systems. Data Extraction, STIX Processing and Output is completed seamlessly within READ. allowing analysts to pivot from extensive CTI documents to valuable, actionable data within seconds. The extracted text is analysed using Elemendar’s proprietary, machine learning-powered Natural Language Processing engine.
-
Farsight Security
Integration Partner
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'Farsight Security (Integration Partner)' }) }});"> More infoFarsight Security
Integration Partner
Farsight Security DNSDB is a Passive DNS historical database that provides a unique, fact-based, multifaceted view of the configuration of the global Internet infrastructure. DNSDB leverages the richness of Farsight’s Security Information Exchange (SIE) data-sharing platform and is engineered and operated by leading DNS experts.
-
Farsight Security DNSDB
Technology Integration
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'Farsight Security DNSDB (Technology Integration)' }) }});"> More infoFarsight Security DNSDB
Technology Integration
Farsight Security DNSDB is a Passive DNS historical database that provides a unique, fact-based, multifaceted view of the configuration of the global Internet infrastructure. DNSDB leverages the richness of Farsight’s Security Information Exchange (SIE) data-sharing platform and is engineered and operated by leading DNS experts.
-
FireEye
Integration Partner
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'FireEye (Integration Partner)' }) }});"> More infoFireEye
Integration Partner
FireEye iSIGHT Intelligence is a proactive, forward-looking means of qualifying threats poised to disrupt your business based on the intents, tools and tactics of the attacker. Our high-fidelity, comprehensive intelligence delivers visibility beyond the typical attack lifecycle, adding context and priority to global threats before, during and after an attack. It helps mitigate risk, bolster incident response, and enhance your overall security ecosystem
-
FireEye iSIGHT Intelligence
Technology Integration
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'FireEye iSIGHT Intelligence (Technology Integration)' }) }});"> More infoFireEye iSIGHT Intelligence
Technology Integration
FireEye iSIGHT Intelligence is a proactive, forward-looking means of qualifying threats poised to disrupt your business based on the intents, tools and tactics of the attacker. Our high-fidelity, comprehensive intelligence delivers visibility beyond the typical attack lifecycle, adding context and priority to global threats before, during and after an attack. It helps mitigate risk, bolster incident response, and enhance your overall security ecosystem.
-
Flashpoint
Integration Partner
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'Flashpoint (Integration Partner)' }) }});"> More info -
Flashpoint
Technology Integration
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'Flashpoint (Technology Integration)' }) }});"> More info -
Forcepoint
Integration Partner
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'Forcepoint (Integration Partner)' }) }});"> More info -
Fortinet
Integration Partner
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'Fortinet (Integration Partner)' }) }});"> More info -
FS-ISAC
Integration Partner, Community Partner
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'FS-ISAC (Integration Partner, Community Partner)' }) }});"> More infoFS-ISAC
Integration Partner, Community Partner
The Financial Services Information Sharing and Analysis Center is the global financial industry's go to resource for cyber and physical threat intelligence analysis and sharing. FS-ISAC operates as a member-owned non profit entity. EclecticIQ is an affiliate member.
-
FS-ISAC
Technology Integration
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'FS-ISAC (Technology Integration)' }) }});"> More info -
Global Resilience Federation (GRF)
Commercial Partner
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'Global Resilience Federation (GRF) (Commercial Partner)' }) }});"> More infoGlobal Resilience Federation (GRF)
Commercial Partner
GRF builds, develops and connects security information sharing communities. GRF is a provider and hub for cyber, supply chain, physical and geopolitical threat intelligence exchange between information sharing and analysis centers (ISACs), organizations (ISAOs) and computer emergency readiness/response teams (CERTs) from many different sectors and regions around the world.
-
Google
Integration Partner
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'Google (Integration Partner)' }) }});"> More info -
GreyNoise
Technology Integration
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'GreyNoise (Technology Integration)' }) }});"> More infoGreyNoise
Technology Integration
GreyNoise helps security teams focus on threats that really matter, and ignore the ones that don’t. We collect, analyze and label data on IP addresses that scan and attack the entire internet, saturating security teams with alerts. This unique perspective helps analysts focus their time on targeted and emerging threats, and waste less time on irrelevant or harmless activity.
-
Group-IB
Integration Partner
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'Group-IB (Integration Partner)' }) }});"> More info -
Group-IB Threat Intelligence
Technology Integration
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'Group-IB Threat Intelligence (Technology Integration)' }) }});"> More info -
Hail a TAXII
Technology Integration
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'Hail a TAXII (Technology Integration)' }) }});"> More info -
Hexillion
Integration Partner
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'Hexillion (Integration Partner)' }) }});"> More infoHexillion
Integration Partner
The Central Ops.net integration enables analysts to investigate domains and IP addresses. This enricher provides registrant information, DNS records and more. All the information is delivered all in one report; making it much quicker and easier for the analyst. Unlike the free service, this paid account means that there is no limit on the amount of times you need to access the tool.
-
Hexillion CentralOps
Technology Integration
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'Hexillion CentralOps (Technology Integration)' }) }});"> More infoHexillion CentralOps
Technology Integration
The Central Ops.net integration enables analysts to investigate domains and IP addresses. This enricher provides registrant information, DNS records and more. All the information is delivered all in one report; making it much quicker and easier for the analyst. Unlike the free service, this paid account means that there is no limit on the amount of times you need to access the tool.
-
Hybrid Analysis
Technology Integration
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'Hybrid Analysis (Technology Integration)' }) }});"> More info -
IBM QRadar SIEM
Technology Integration
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'IBM QRadar SIEM (Technology Integration)' }) }});"> More infoIBM QRadar SIEM
Technology Integration
IBM QRadar SIEM consolidates log events and network flow data from thousands of devices, endpoints and applications distributed throughout a network. It normalizes and correlates raw data to identify security offenses, and uses an advanced Sense Analytics engine to baseline normal behavior, detect anomalies, uncover advanced threats, and remove false positives.
-
IBM QRadar SOAR
Technology Integration
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'IBM QRadar SOAR (Technology Integration)' }) }});"> More infoIBM QRadar SOAR
Technology Integration
IBM QRadar SOAR is the leading platform for orchestrating and automating incident response processes. IBM QRadar SOAR Platform quickly and easily integrates with your organization’s existing security and IT investments. It makes security alerts instantly actionable, provides valuable intelligence and incident context, and enables adaptive response to complex cyber threats. The latest innovation to IBM QRadar SOAR, Dynamic Playbooks, provides the agility, intelligence, and sophistication needed to contend with complex attacks.
-
IBM Security
Integration Partner
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'IBM Security (Integration Partner)' }) }});"> More infoIBM Security
Integration Partner
IBM Security offers one of the most advanced and integrated portfolios of enterprise security products and services. The portfolio, supported by world- renowned IBM Security X-Force® research, enables organizations to effectively manage risk and defend against emerging threats. IBM operates one of the world’s broadest security research, development and delivery organizations, monitors 150 billion+ security events per day in more than 130 countries, and has been granted more than 10,000 security patents worldwide.
-
Infoblox
Integration Partner
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'Infoblox (Integration Partner)' }) }});"> More infoInfoblox
Integration Partner
Infoblox DDI is a industry-leading, integrated, and centrally managed approach to delivering enterprise-grade DDI. It uses the patented Infoblox Grid TM technology to ensure high availability DNS, DHCP, and IPAM services throughout your distributed network. Infoblox DDI makes it easier for you to achieve higher levels service uptime, security, and operational efficiencies across diverse infrastructure, including on-prem, cloud and hybrid deployments.
-
Infoblox DNS, DHCP, AND IPAM (DDI)
Technology Integration
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'Infoblox DNS, DHCP, AND IPAM (DDI) (Technology Integration)' }) }});"> More infoInfoblox DNS, DHCP, AND IPAM (DDI)
Technology Integration
Infoblox DDI is a industry-leading, integrated, and centrally managed approach to delivering enterprise-grade DDI. It uses the patented Infoblox Grid TM technology to ensure high availability DNS, DHCP, and IPAM services throughout your distributed network. Infoblox DDI makes it easier for you to achieve higher levels service uptime, security, and operational efficiencies across diverse infrastructure, including on-prem, cloud and hybrid deployments.
-
Intel 471
Integration Partner
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'Intel 471 (Integration Partner)' }) }});"> More infoIntel 471
Integration Partner
Intel 471 provides Adversary and Malware Intelligence for leading intelligence, security and fraud teams. Adversary Intelligence is focused on infiltrating and maintaining access to closed sources where threat actors collaborate, communicate and plan cyber-attacks. Malware Intelligence leverages our underground access to provide timely data and context on malware and adversary infrastructure.
-
Intel 471 Adversary Intelligence
Technology Integration
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'Intel 471 Adversary Intelligence (Technology Integration)' }) }});"> More infoIntel 471 Adversary Intelligence
Technology Integration
Intel 471 provides Adversary and Malware Intelligence for leading intelligence, security and fraud teams. Adversary Intelligence is focused on infiltrating and maintaining access to closed sources where threat actors collaborate, communicate and plan cyber-attacks. Malware Intelligence leverages our underground access to provide timely data and context on malware and adversary infrastructure.
-
Intel 471 Malware Intelligence
Technology Integration
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'Intel 471 Malware Intelligence (Technology Integration)' }) }});"> More infoIntel 471 Malware Intelligence
Technology Integration
Intel 471 provides Adversary and Malware Intelligence for leading intelligence, security and fraud teams. Adversary Intelligence is focused on infiltrating and maintaining access to closed sources where threat actors collaborate, communicate and plan cyber-attacks. Malware Intelligence leverages our underground access to provide timely data and context on malware and adversary infrastructure.
-
IntSights Alerts
Technology Integration
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'IntSights Alerts (Technology Integration)' }) }});"> More info -
Joe Sandbox
Technology Integration
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'Joe Sandbox (Technology Integration)' }) }});"> More info -
Joe Security
Integration Partner
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'Joe Security (Integration Partner)' }) }});"> More info -
Kaspersky
Integration Partner
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'Kaspersky (Integration Partner)' }) }});"> More infoKaspersky
Integration Partner
All the knowledge acquired by Kaspersky about cyberthreats, legitimate objects and their various relationships, brought together into a single, powerful web service. Real-time search of many petabytes of threat relationship data enables highly effective incident investigations and threat hunting.
-
Kaspersky APT Intelligence Reporting
Technology Integration
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'Kaspersky APT Intelligence Reporting (Technology Integration)' }) }});"> More infoKaspersky APT Intelligence Reporting
Technology Integration
Exclusive, proactive access to Kaspersky’s most recent investigations and insights, revealing the methods, tactics and tools used by APT actors in high-profile cyberespionage campaigns with cross-sector targeting. Information provided in these reports allows to improve threat hunting missions and develop effective security use cases for proactive defense.
-
Kaspersky Threat Data Feeds
Technology Integration
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'Kaspersky Threat Data Feeds (Technology Integration)' }) }});"> More infoKaspersky Threat Data Feeds
Technology Integration
Context-rich and immediately actionable threat intelligence feeds containing information on suspicious and dangerous IPs, URLs and file hashes, enable efficient alert triage process while providing enough context to immediately identify alerts that need to be investigated or escalated to incident response team.
-
Kaspersky Threat Lookup
Technology Integration
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'Kaspersky Threat Lookup (Technology Integration)' }) }});"> More infoKaspersky Threat Lookup
Technology Integration
All the knowledge acquired by Kaspersky about cyberthreats, legitimate objects and their various relationships, brought together into a single, powerful web service. Real-time search of many petabytes of threat relationship data enables highly effective incident investigations and threat hunting.
-
KPN
Commercial Partner
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'KPN (Commercial Partner)' }) }});"> More info -
MaxMind GeoIP
Technology Integration
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'MaxMind GeoIP (Technology Integration)' }) }});"> More info -
Micro Focus
Integration Partner
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'Micro Focus (Integration Partner)' }) }});"> More infoMicro Focus
Integration Partner
Micro Focus ArcSight ESM identifies and prioritize threats in real time so you can respond and remediate quickly. Correlate security logs from multiple data feeds, improve the accuracy of security alerts with complex use cases, and uncover advanced cyber attacks that previously went undetected.
-
Micro Focus ArcSight ESM
Technology Integration
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'Micro Focus ArcSight ESM (Technology Integration)' }) }});"> More infoMicro Focus ArcSight ESM
Technology Integration
Micro Focus ArcSight ESM identifies and prioritize threats in real time so you can respond and remediate quickly. Correlate security logs from multiple data feeds, improve the accuracy of security alerts with complex use cases, and uncover advanced cyber attacks that previously went undetected.
-
Microsoft
Integration Partner
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'Microsoft (Integration Partner)' }) }});"> More infoMicrosoft
Integration Partner
See and stop threats before they cause harm, with SIEM reinvented for a modern world. Azure Sentinel is your birds-eye view across the enterprise. Put the cloud and large-scale intelligence from decades of Microsoft security experience to work. Make your threat detection and response smarter and faster with artificial intelligence (AI). Eliminate security infrastructure setup and maintenance, and elastically scale to meet your security needs—while reducing IT costs.
-
Microsoft Azure Sentinel
Technology Integration
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'Microsoft Azure Sentinel (Technology Integration)' }) }});"> More infoMicrosoft Azure Sentinel
Technology Integration
See and stop threats before they cause harm, with SIEM reinvented for a modern world. Azure Sentinel is your birds-eye view across the enterprise. Put the cloud and large-scale intelligence from decades of Microsoft security experience to work. Make your threat detection and response smarter and faster with artificial intelligence (AI). Eliminate security infrastructure setup and maintenance, and elastically scale to meet your security needs—while reducing IT costs.
-
MISP
Technology Integration
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'MISP (Technology Integration)' }) }});"> More infoMISP
Technology Integration
MISP is an open source platform that allows for easy IOC sharing among distinct organizations. With this MISP integration, threat analysts can ingest the IOCs they receive from MISP and apply their threat investigation and dissemination workflows right from EclecticIQ Platform. Download the Solutions Brief for more detailed information.
-
MITRE
Integration Partner
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'MITRE (Integration Partner)' }) }});"> More infoMITRE
Integration Partner
Understanding how the adversary operates is essential to effective cyber security. CAPEC™ helps by providing a comprehensive dictionary of known patterns of attack employed by adversaries to exploit known weaknesses in cyber-enabled capabilities. It can be used by analysts, developers, testers, and educators to advance community understanding and enhance defenses.
-
National Institute of Standards and Technology (NIST)
Integration Partner
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'National Institute of Standards and Technology (NIST) (Integration Partner)' }) }});"> More info -
New Context
Commercial Partner
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'New Context (Commercial Partner)' }) }});"> More infoNew Context
Commercial Partner
New Context is the security innovator for highly regulated industries. Our products and consulting services enable global leaders in energy, government and across the enterprise to prepare for security orchestration, building critical infrastructure that works with emerging technologies. New Context consultants work as high-value partners of customer security operations, building tools for CTI, security automation & orchestration and data governance.
-
NL Platform
Community Partner
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'NL Platform (Community Partner)' }) }});"> More info -
NSFOCUS
Integration Partner
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'NSFOCUS (Integration Partner)' }) }});"> More infoNSFOCUS
Integration Partner
The integration of NSFocus Global Intelligence includes both the feed and enricher. NSFocus Threat Intelligence, with its extensive sources, provides analysts with enricher information for IP addresses, Domains, CVEs and files. The NSFocus API allows analysts to work with the security event data as a feed. The cyber threat landscape in China is larger and more complex than anywhere else. With this integration, analysts have insight into world's largest numbers of Internet-connected devices and, vast numbers of Internet users.
-
NSFocus
Technology Integration
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'NSFocus (Technology Integration)' }) }});"> More infoNSFocus
Technology Integration
The integration of NSFocus Global Intelligence includes both the feed and enricher. NSFocus Threat Intelligence, with its extensive sources, provides analysts with enricher information for IP addresses, Domains, CVEs and files. The NSFocus API allows analysts to work with the security event data as a feed. The cyber threat landscape in China is larger and more complex than anywhere else. With this integration, analysts have insight into world's largest numbers of Internet-connected devices and, vast numbers of Internet users.
-
NTT DATA Intellilink (NDI)
Commercial Partner
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'NTT DATA Intellilink (NDI) (Commercial Partner)' }) }});"> More infoNTT DATA Intellilink (NDI)
Commercial Partner
NTT DATA INTELLILINK as a platform technology leader in NTT DATA Group, offers consulting and systems integration services delivered by the best professionals in IT industry across the globe. Our unique capabilities in system platform stack tightly coupled with NTT DATA's deep and broad industry expertise.
-
NVD (National Vulnerability Database)
Technology Integration
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'NVD (National Vulnerability Database) (Technology Integration)' }) }});"> More infoNVD (National Vulnerability Database)
Technology Integration
The NVD (National Vulnerability Database) Vulnerability Intelligence Feed retrieves CVEs (Common Vulnerability and Exploits) from the NVD CVE API. NVD offers this as a free service -- any customer can use this integration. This integration mainly supports vulnerability management use-cases in the platform.
-
OASIS CTI Technical Committee
Community Partner
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'OASIS CTI Technical Committee (Community Partner)' }) }});"> More info -
OpenPhish
Technology Integration
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'OpenPhish (Technology Integration)' }) }});"> More info -
Palo Alto Networks
Integration Partner
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'Palo Alto Networks (Integration Partner)' }) }});"> More infoPalo Alto Networks
Integration Partner
Palo Alto Networks, the global cybersecurity leader, is shaping the cloud-centric future with technology that is transforming the way people and organizations operate. Our mission is to be the cybersecurity partner of choice, protecting our digital way of life. We help address the world's greatest security challenges with continuous innovation that seizes the latest breakthroughs in artificial intelligence, analytics, automation, and orchestration. By delivering an integrated platform and empowering a growing ecosystem of partners, we are at the forefront of protecting tens of thousands of organizations across clouds, networks, and mobile devices. Our vision is a world where each day is safer and more secure than the one before
-
Palo Alto Networks AutoFocus
Technology Integration
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'Palo Alto Networks AutoFocus (Technology Integration)' }) }});"> More infoPalo Alto Networks AutoFocus
Technology Integration
AutoFocus contextual threat intelligence brings speed, consistency and precision to threat investigation. It provides instant access to community-based threat data, enhanced with deep context and attribution from the Unit 42 threat research team, saving time and effort. Now teams can quickly investigate, correlate and pinpoint malware’s root cause without adding dedicated malware researchers or additional tools. Plus, automated protections make it simple to turn raw intelligence into protection across your environment.
-
Palo Alto Networks Cortex SOAR
Technology Integration
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'Palo Alto Networks Cortex SOAR (Technology Integration)' }) }});"> More infoPalo Alto Networks Cortex SOAR
Technology Integration
Cortex XSOAR helps simplify security operations by unifying automation, case management, real-time collaboration, and threat intelligence management. You can manage alerts across all sources, standardize processes with playbooks, take action on threat intelligence, and automate response options for virtually any use case to speed up investigations.
-
PCS Security
Commercial Partner
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'PCS Security (Commercial Partner)' }) }});"> More infoPCS Security
Commercial Partner
PCS Security is a Singapore-based solution provider with years of experience and accolades in providing secure, reliable and state-of-the-art security solutions to help our Customers address their security concerns. We deliver full turn-key solutions from design, integration, commissioning to post-implementation maintenance and support.
-
PhishTank
Technology Integration
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'PhishTank (Technology Integration)' }) }});"> More info -
Pink Elephant
Commercial Partner
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'Pink Elephant (Commercial Partner)' }) }});"> More info -
Proofpoint
Integration Partner
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'Proofpoint (Integration Partner)' }) }});"> More info -
Qualys
Integration Partner
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'Qualys (Integration Partner)' }) }});"> More infoQualys
Integration Partner
Qualys is a pioneer and leading provider of cloud-based security and compliance solutions with over 11,000 customers in more than 130 countries, including a majority of each of the Forbes Global 100 and Fortune 100. Qualys helps organizations streamline and consolidate their security and compliance solutions in a single platform and build security into digital transformation initiatives for greater agility, better business outcomes and substantial cost savings.
-
Qualys
Technology Integration
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'Qualys (Technology Integration)' }) }});"> More infoQualys
Technology Integration
With VMDR, enterprises are empowered with visibility and insight into cyber risk exposure - making it easy to prioritize vulnerabilities, assets, or groups of assets based on business risk. Security teams can take action to mitigate risk, helping the business measure its true risk, and track risk reduction over time.
-
Recorded Future
Integration Partner
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'Recorded Future (Integration Partner)' }) }});"> More infoRecorded Future
Integration Partner
The Recorded Future integration provides both a feed and enricher capabilities. With the feed, users have access to the Recorded Future Risk List which includes IP and file hashes, for example. The results are provided in standard STIX/TAXII protocols including TTPs and Indicators. The enricher allows users to query Domains, hashes, URLs and IP addresses.
-
Recorded Future
Technology Integration
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'Recorded Future (Technology Integration)' }) }});"> More infoRecorded Future
Technology Integration
The Recorded Future integration provides both a feed and enricher capabilities. With the feed, users have access to the Recorded Future Risk List which includes IP and file hashes, for example. The results are provided in standard STIX/TAXII protocols including TTPs and Indicators. The enricher allows users to query Domains, hashes, URLs and IP addresses.
-
RIPE NCC
Integration Partner
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'RIPE NCC (Integration Partner)' }) }});"> More info -
RIPEstat GeoIP / RIPEstat Whois
Technology Integration
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'RIPEstat GeoIP / RIPEstat Whois (Technology Integration)' }) }});"> More info -
RiskIQ
Integration Partner
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'RiskIQ (Integration Partner)' }) }});"> More info -
RiskIQ PassiveTotal
Technology Integration
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'RiskIQ PassiveTotal (Technology Integration)' }) }});"> More info -
RSA NetWitness / Security Analytics
Technology Integration
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'RSA NetWitness / Security Analytics (Technology Integration)' }) }});"> More infoRSA NetWitness / Security Analytics
Technology Integration
Using the NetWitness app, RSA users are able to leverage the power of EclecticIQ Platform directly from the NetWitness interface. Users can receive IOCs from the platform to trigger security alerts, and send sightings back to EclecticIQ Platform.
-
RSA Security
Integration Partner
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'RSA Security (Integration Partner)' }) }});"> More info -
Security Delta (HSD)
Community Partner
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'Security Delta (HSD) (Community Partner)' }) }});"> More info -
Shodan
Technology Integration
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'Shodan (Technology Integration)' }) }});"> More info -
Silobreaker
Integration Partner
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'Silobreaker (Integration Partner)' }) }});"> More infoSilobreaker
Integration Partner
Silobreaker helps business, security and intelligence professionals make sense of the overwhelming amount of unstructured data on the web. By providing powerful tools and visualisations that cut through the noise and analyse data from hundreds of thousands of open sources, Silobreaker makes it easy for users to monitor and research threats or opportunities.
-
Silobreaker
Technology Integration
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'Silobreaker (Technology Integration)' }) }});"> More infoSilobreaker
Technology Integration
Silobreaker helps business, security and intelligence professionals make sense of the overwhelming amount of unstructured data on the web. By providing powerful tools and visualisations that cut through the noise and analyse data from hundreds of thousands of open sources, Silobreaker makes it easy for users to monitor and research threats or opportunities.
-
SoftwareONE
Commercial Partner
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'SoftwareONE (Commercial Partner)' }) }});"> More infoSoftwareONE
Commercial Partner
SoftwareONE is a leading global provider of end-to-end software and cloud technology solutions. It enables commercial, technology and digital transformations using IP and technology-driven services. Clients can modernize applications and migrate critical workloads on public clouds while optimizing their related software and cloud assets and licensing in parallel.
-
Splunk
Integration Partner
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'Splunk (Integration Partner)' }) }});"> More infoSplunk
Integration Partner
The Splunk platform removes the barriers between data and action, empowering observability, IT and security teams to ensure their organizations are secure, resilient and innovative. Founded in 2003, Splunk is a global company — with over 7,500 employees, Splunkers have received over 1,020 patents to date and availability in 21 regions around the world — and offers an open, extensible data platform that supports shared data across any environment so that all teams in an organization can get end-to-end visibility, with context, for every interaction and business process. Build a strong data foundation with Splunk.
-
Splunk Enterprise Security
Technology Integration
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'Splunk Enterprise Security (Technology Integration)' }) }});"> More infoSplunk Enterprise Security
Technology Integration
* Operational Intelligence optimizes your IT, security and business performance * Collect operational data (including logs, clickstreams, sensors, stream network traffic, web servers, custom applications, hypervisors, containers, social media and cloud services) * Search, monitor and analyze data to discover powerful insights for security and IT operations. * Understand trends, patterns of activity and behavior to make more informed decision
-
Splunk SOAR
Technology Integration
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'Splunk SOAR (Technology Integration)' }) }});"> More info -
SpyCloud
Integration Partner
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'SpyCloud (Integration Partner)' }) }});"> More info -
SpyCloud
Technology Integration
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'SpyCloud (Technology Integration)' }) }});"> More info -
Sumo Logic
Integration Partner
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'Sumo Logic (Integration Partner)' }) }});"> More infoSumo Logic
Integration Partner
Sumo Logic empowers the people who power modern, digital business through its Continuous Intelligence Platform™. Practitioners and developers around the world rely on Sumo Logic to gain real-time analytics and insights from their cloud-native applications, helping them ensure application reliability, secure and protect against modern security threats, and gain insights into their cloud infrastructures.
-
Sumo Logic Cloud SIEM
Technology Integration
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'Sumo Logic Cloud SIEM (Technology Integration)' }) }});"> More infoSumo Logic Cloud SIEM
Technology Integration
Sumo Logic Cloud SIEM provides security analysts and SOC managers with enhanced visibility across the enterprise to thoroughly understand the scope and context of an attack. Automated parsing, mapping and normalization of records from your structured and unstructured data is correlated in real time to detect threats, enabling streamlined SOC workflows designed to detect known and unknown threats faster. Configurable as a custom integration.
-
Sumo Logic Cloud SOAR
Technology Integration
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'Sumo Logic Cloud SOAR (Technology Integration)' }) }});"> More infoSumo Logic Cloud SOAR
Technology Integration
Automate real-time threat investigation, incident management and threat response while reducing false positives and analyst fatigue with Sumo Logic Cloud SOAR. Leverage hundreds of pre-built integrations with leading third-party threat intelligence vendors to help secure operations, automate incident response and reduce time to remediation. Configurable as a custom integration.
-
Symantec DeepSight Intelligence Datafeeds
Technology Integration
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'Symantec DeepSight Intelligence Datafeeds (Technology Integration)' }) }});"> More infoSymantec DeepSight Intelligence Datafeeds
Technology Integration
Leveraging the extensive Symantec Global Intelligence Network, this integration feed allows users to collect raw intelligence data making it available within EclecticIQ Platform. The feed provides a broad range of insights, covering reputation and threat intelligence data for IP, URLs, attacks, bots, cnc, malware, fraud, and phishing.
-
Syntx
Commercial Partner
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'Syntx (Commercial Partner)' }) }});"> More infoSyntx
Commercial Partner
Syntx is a knowledge-based cyber security startup, formed by a local group of information technology and cyber security specialist. Syntx is supported by its trusted network of technology partners and service providers that works in collaboration with shared and clear vision of addressing the needs as well as challenges of our customers.
-
TechLab Security
Commercial Partner
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'TechLab Security (Commercial Partner)' }) }});"> More infoTechLab Security
Commercial Partner
TechLab Securities Sdn Bhd is a team of Security Specialists, passionate in technology, providing solutions for Information Security and Internet Gateway solutions. We have a wide product and services range and have now established ourselves as a leading Enterprise Systems Integrator and Solutions provider. Our solutions and services are sought after by customers from different backgrounds. This vindicates the quality of our offering and shows how we have successfully customised solutions to suit the needs of the niche industries we are present in.
-
The National Cyber-Forensics and Training Alliance (NCFTA)
Technology Integration
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'The National Cyber-Forensics and Training Alliance (NCFTA) (Technology Integration)' }) }});"> More infoThe National Cyber-Forensics and Training Alliance (NCFTA)
Technology Integration
The NCFTA was created by industry, academia, and law enforcement for the sole purpose of establishing a neutral, trusted environment that enables two-way information sharing with the ultimate goal to identify, mitigate, disrupt, and neutralize cyber threats.
-
Threat Crowd
Technology Integration
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'Threat Crowd (Technology Integration)' }) }});"> More infoThreat Crowd
Technology Integration
ThreatCrowd is an Open Source system for finding and researching artefacts relating to cyber threats, utilizing information obtained by crawling various Open Source resources, including VirusTotal and Malwr.ThreatCrowd is an Open Source system for finding and researching artefacts relating to cyber threats, utilizing information obtained by crawling various Open Source resources, including VirusTotal and Malwr.r
-
Trusted Cyber Security Solutions (TCSS)
Commercial Partner
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'Trusted Cyber Security Solutions (TCSS) (Commercial Partner)' }) }});"> More info -
Vigilante
Technology Integration
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'Vigilante (Technology Integration)' }) }});"> More infoVigilante
Technology Integration
Vigilante is a global threat hunting and dark web cyber intelligence research team, delivering a combination of vast, unique human intelligence and automation that is targeted for each client to help them identify their biggest risks and defend against the most sophisticated adversaries.
-
VirusTotal
Technology Integration
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'VirusTotal (Technology Integration)' }) }});"> More infoVirusTotal
Technology Integration
With VirusTotal users can analyze suspicious files and URLs. It facilitates the quick identification of viruses, worms, trojans and all kinds of malware. Integrating VirusTotal means that users don’t need to leave EclecticIQ Platform – everything is at your fingertips which saves time and minimizes the number of tools open at once. The integration supports the premium service for feeds and enrichers; plus, the free service for enrichers. VirusTotal helps users by providing more condensed, ingestible and corroborable information.
-
VMRay
Integration Partner
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'VMRay (Integration Partner)' }) }});"> More infoVMRay
Integration Partner
Surmounting the persistent shortcomings of other DFIR tools, VMRay delivers rapid detection results and in-depth analysis reports without compromising performance or security. VMRay flexibly integrates with other systems, automating the submission of files and URLs for analysis. Precise, actionable results are returned that drive block/allow decisions and other security measures across the enterprise.
-
VMRay
Technology Integration
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'VMRay (Technology Integration)' }) }});"> More infoVMRay
Technology Integration
Surmounting the persistent shortcomings of other DFIR tools, VMRay delivers rapid detection results and in-depth analysis reports without compromising performance or security. VMRay flexibly integrates with other systems, automating the submission of files and URLs for analysis. Precise, actionable results are returned that drive block/allow decisions and other security measures across the enterprise.
-
Webroot
Technology Integration
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'Webroot (Technology Integration)' }) }});"> More info -
Zscaler
Technology Integration
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'Zscaler (Technology Integration)' }) }});"> More infoZscaler
Technology Integration
Zscaler accelerates digital transformation so that customers can be more agile and secure. The Zscaler Zero Trust Exchange, a SASE-based platform, is the world’s largest inline cloud security platform, protecting thousands of customers from cyberattacks and data loss by securely connecting users, devices, and applications over any network. Zscaler integrates with EclecticIQ by consuming high-confidence indicators to enforce real-time policies and ensure all users get complete protection from emerging threats and targeted attacks.