-
Accenture CTI Threat Feed
Technology Integration
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'Accenture CTI Threat Feed (Technology Integration)' }) }});"> More infoAccenture CTI Threat Feed
Technology Integration
The Accenture CTI Threat Feed is a highly refined, human-curated, intelligence source that provides insight on the latest threats with an exceptionally low false-positive ratio. Coupled with Accenture’s world-class cybersecurity services, our CTI Threat Feed will help your teams to achieve more than just “cyber security”; they will help you achieve cyber resilience.
-
AlienVault Open Threat Exchange
Technology Integration
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'AlienVault Open Threat Exchange (Technology Integration)' }) }});"> More info -
Amazon S3
Technology Integration
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'Amazon S3 (Technology Integration)' }) }});"> More infoAmazon S3
Technology Integration
Amazon Simple Storage Service (Amazon S3) is an object storage service that offers industry-leading scalability, data availability, security, and performance. This means customers of all sizes and industries can use it to store and protect any amount of data for a range of use cases, such as websites, mobile applications, backup and restore, archive, enterprise applications, IoT devices, and big data analytics. Amazon S3 provides easy-to-use management features so you can organize your data and configure finely-tuned access controls to meet your specific business, organizational, and compliance requirements. Amazon S3 is designed for 99.999999999% (11 9's) of durability, and stores data for millions of applications for companies all around the world.
-
Binary Defense Artillery
Technology Integration
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'Binary Defense Artillery (Technology Integration)' }) }});"> More info -
BitDefender
Technology Integration
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'BitDefender (Technology Integration)' }) }});"> More infoBitDefender
Technology Integration
The Bitdefender Advanced Threat Intelligence solution helps security professionals gain visibility into the latest threats by using up-to-date, contextual intelligence on URLs, IPs, domains, certificates, files, Command and Control servers and Advanced Persistent Threats.
-
CAPEC - Common Attack Pattern Enumeration and Classification
Technology Integration
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'CAPEC - Common Attack Pattern Enumeration and Classification (Technology Integration)' }) }});"> More infoCAPEC - Common Attack Pattern Enumeration and Classification
Technology Integration
Understanding how the adversary operates is essential to effective cyber security. CAPEC™ helps by providing a comprehensive dictionary of known patterns of attack employed by adversaries to exploit known weaknesses in cyber-enabled capabilities. It can be used by analysts, developers, testers, and educators to advance community understanding and enhance defenses.
-
CIRCL Passive SSL
Technology Integration
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'CIRCL Passive SSL (Technology Integration)' }) }});"> More infoCIRCL Passive SSL
Technology Integration
CIRCL Passive SSL is a database storing historical X.509 certificates seen per IP address. The Passive SSL historical data is indexed per IP address, which makes it searchable for incident handlers, security analysts or researchers. The Passive SSL enricher will retrieve domains and IP’s associated with an SSL Certificate hash.
-
Cisco OpenDNS / OpenResolve
Technology Integration
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'Cisco OpenDNS / OpenResolve (Technology Integration)' }) }});"> More infoCisco OpenDNS / OpenResolve
Technology Integration
Take faster action on newly discovered malicious domains by leveraging a turn-key integration between Cisco and OpenDNS. Through security automation, dwell time is reduced from hours or days to only minutes. And by gaining Internet-wide visibility in real-time, you will discover more compromised systems.
-
Cisco Threat Grid
Technology Integration
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'Cisco Threat Grid (Technology Integration)' }) }});"> More infoCisco Threat Grid
Technology Integration
Cisco Threat Grid analyzes suspicious behavior in your network against more than 450 behavioral indicators and a malware knowledge base sourced from around the world. Threat Grid content feeds are pre-generated, curated sets of behavioural indicators that are produced in the Threat Grid Cloud infrastructure from sample analysis results. Feeds are used by organizations and partners for targeted threat intelligence, by focusing on the specific types of threats faced by particular industries.
-
Cisco Umbrella
Technology Integration
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'Cisco Umbrella (Technology Integration)' }) }});"> More infoCisco Umbrella
Technology Integration
The Cisco Umbrella API helps analysts quickly understand registration details, similar domains and potential malicious ties to observable data. With this integration, analysts can quickly discern threats and attribution intelligence from observables used in active campaigns as the cloud-based enricher provides information relating domains, IP addresses and file hashes. Combining this integration with EclecticIQ Platform enables analysts to dynamically build a repository of intelligence relating to domain activity.
-
Cofense PhishMe
Technology Integration
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'Cofense PhishMe (Technology Integration)' }) }});"> More infoCofense PhishMe
Technology Integration
Cofense PhishMe is the leading provider of human-driven phishing defense solutions worldwide. Our collective defense suite combines best-in class incident response technologies with timely attack intelligence sourced from employees. Cofense enables thousands of global organizations to stop attacks in progress faster and stay ahead of breaches.
-
Common Vulnerabilities and Exposures (CVE)
Technology Integration
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'Common Vulnerabilities and Exposures (CVE) (Technology Integration)' }) }});"> More infoCommon Vulnerabilities and Exposures (CVE)
Technology Integration
Enrich intelligence with exploit target information, from the standard source of vulnerabilities and exposures: the MITRE corporation. The enricher and feed uses the Computer Incident Response Center Luxembourg (CIRCL) cve-search API to retrieve all the available details.
-
CrowdStrike Falcon Insight / EDR
Technology Integration
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'CrowdStrike Falcon Insight / EDR (Technology Integration)' }) }});"> More infoCrowdStrike Falcon Insight / EDR
Technology Integration
CrowdStrike® Falcon Insight™ eliminates silent failure by providing the highest level of real-time monitoring capabilities that span across detection, response and forensics. This ensures nothing is missed, leaving attackers with no place to hide. Falcon Insight provides organizations with state-of-the-art endpoint detection and response (EDR), following an approach recommended by top analyst firms such as Gartner.
-
Crowdstrike Falcon Intelligence
Technology Integration
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'Crowdstrike Falcon Intelligence (Technology Integration)' }) }});"> More infoCrowdstrike Falcon Intelligence
Technology Integration
Crowdstrike is a global leader in the cloud-delivered next-generation endpoint protection. With a single lightweight agent, CrowdStrike is the first company to unify next-generation antivirus that includes machine learning and behavioral analytics, endpoint detection and response (EDR), and a 24/7 managed hunting service all in one lightweight agent. Falcon Intelligence TM is a cost-effective program tailored to each company’s needs and requirements and addresses the legal and technical aspects of preventing harm that results from a cyberattack.
-
CyberCrime Tracker
Technology Integration
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'CyberCrime Tracker (Technology Integration)' }) }});"> More info -
Cybereason Endpoint Detection and Response (EDR)
Technology Integration
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'Cybereason Endpoint Detection and Response (EDR) (Technology Integration)' }) }});"> More info -
Digital Shadows SearchLight
Technology Integration
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'Digital Shadows SearchLight (Technology Integration)' }) }});"> More info -
DomainTools
Technology Integration
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'DomainTools (Technology Integration)' }) }});"> More infoDomainTools
Technology Integration
DomainTools helps security analysts turn threat data into threat intelligence. We take indicators from your network and connect them with nearly every active domain on the Internet. Fortune 1000 companies, global government agencies, and leading security solution vendors use the DomainTools platform as a critical ingredient in their threat investigation and mitigation work.
-
DomainTools Domain Profile
Technology Integration
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'DomainTools Domain Profile (Technology Integration)' }) }});"> More infoDomainTools Domain Profile
Technology Integration
DomainTools helps security analysts turn threat data into threat intelligence. We take indicators from your network and connect them with nearly every active domain on the Internet. Fortune 1000 companies, global government agencies, and leading security solution vendors use the DomainTools platform as a critical ingredient in their threat investigation and mitigation work.
-
DomainTools Reverse IP Whois
Technology Integration
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'DomainTools Reverse IP Whois (Technology Integration)' }) }});"> More infoDomainTools Reverse IP Whois
Technology Integration
The Whois Lookup API provides the ownership record for a domain name or IP address with basic registration details. The API is optimized to respond quickly and is designed to handle a high volume of parallel requests. This is the ideal product to use if you have a busy web site or a long list of domains that you need to process.
-
Dragos
Technology Integration
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'Dragos (Technology Integration)' }) }});"> More infoDragos
Technology Integration
As a leading provider of industrial control systems cybersecurity, the Dragos threat detection and response platform codifies decades of real-world experience in advanced threat analytics. It provides operational and information technology practitioners unprecedented visibility and prescriptive procedures to respond to adversaries in the industrial threat landscape. Through the integration with EclecticIQ Platform, Threat Intelligence Analysts now have access to relevant reports, Indicators, Threat Actors, TTPs and observables that Dragos provides for this unique threat landscape.
-
DShield
Technology Integration
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'DShield (Technology Integration)' }) }});"> More infoDShield
Technology Integration
DShield provides a platform for users of firewalls and intrusion detection systems to share intrusion information. This data is cataloged and summarized and can be used to discover trends in activity, confirm widespread attacks. This data is accessable through the Internet Storm Center/DShield REST API. DShield is a free and open service.
-
EclecticIQ Browser Extension
Technology Integration
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'EclecticIQ Browser Extension (Technology Integration)' }) }});"> More infoEclecticIQ Browser Extension
Technology Integration
The Browser Extension is an add-on for your web browser, specifically made for EclecticIQ Platform. It lets analysts quickly and easily process both external threat data found in human-written reports and machine-generated data from internal security controls. Analysts can capture the data, structure it and subsequently ingest it into their Platform in one flow, without ever leaving the page they are on.
-
EclecticIQ Custom Integrations
Technology Integration
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'EclecticIQ Custom Integrations (Technology Integration)' }) }});"> More infoEclecticIQ Custom Integrations
Technology Integration
Besides the integrations listed above, organizations can configure their own custom integration based on the following standards: ArcSight CEF, EclecticIQ CSV, EclecticIQ JSON, Email (IMAP), File system, FTP Push, HTTP Download, STIX 1.2, Syslog (UDP/TCP), TAXII (Poll/Push), Plain text (e.g. Snort Rules, Yara Signatures)
-
EclecticIQ FortiSOAR connector
Technology Integration
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'EclecticIQ FortiSOAR connector (Technology Integration)' }) }});"> More infoEclecticIQ FortiSOAR connector
Technology Integration
The EclecticIQ FortiSOAR connector, facilitates automated interactions, with the EclecticIQ platform using FortiSOAR playbooks. Add the EclecticIQ connector as a step in FortiSOAR playbooks and perform automated operations, such as retrieving reputations of domains, URLs, IP addresses, etc., from EclecticIQ, querying the EclecticIQ platform for entities, and creating sighting in the EclecticIQ platform.
-
EclecticIQ Security Controls
Technology Integration
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'EclecticIQ Security Controls (Technology Integration)' }) }});"> More info -
EclecticIQ STIX-formatted data
Technology Integration
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'EclecticIQ STIX-formatted data (Technology Integration)' }) }});"> More info -
Elemendar READ
Technology Integration
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'Elemendar READ (Technology Integration)' }) }});"> More infoElemendar READ
Technology Integration
READ. processes human-authored, unstructured CTI reports into structured CTI data. This machine-readable data can then be fed directly into a TIP or defensive systems. Data Extraction, STIX Processing and Output is completed seamlessly within READ. allowing analysts to pivot from extensive CTI documents to valuable, actionable data within seconds. The extracted text is analysed using Elemendar’s proprietary, machine learning-powered Natural Language Processing engine.
-
Farsight Security DNSDB
Technology Integration
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'Farsight Security DNSDB (Technology Integration)' }) }});"> More infoFarsight Security DNSDB
Technology Integration
Farsight Security DNSDB is a Passive DNS historical database that provides a unique, fact-based, multifaceted view of the configuration of the global Internet infrastructure. DNSDB leverages the richness of Farsight’s Security Information Exchange (SIE) data-sharing platform and is engineered and operated by leading DNS experts.
-
FireEye iSIGHT Intelligence
Technology Integration
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'FireEye iSIGHT Intelligence (Technology Integration)' }) }});"> More infoFireEye iSIGHT Intelligence
Technology Integration
FireEye iSIGHT Intelligence is a proactive, forward-looking means of qualifying threats poised to disrupt your business based on the intents, tools and tactics of the attacker. Our high-fidelity, comprehensive intelligence delivers visibility beyond the typical attack lifecycle, adding context and priority to global threats before, during and after an attack. It helps mitigate risk, bolster incident response, and enhance your overall security ecosystem.
-
Flashpoint
Technology Integration
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'Flashpoint (Technology Integration)' }) }});"> More info -
FS-ISAC
Technology Integration
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'FS-ISAC (Technology Integration)' }) }});"> More info -
GreyNoise
Technology Integration
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'GreyNoise (Technology Integration)' }) }});"> More infoGreyNoise
Technology Integration
GreyNoise helps security teams focus on threats that really matter, and ignore the ones that don’t. We collect, analyze and label data on IP addresses that scan and attack the entire internet, saturating security teams with alerts. This unique perspective helps analysts focus their time on targeted and emerging threats, and waste less time on irrelevant or harmless activity.
-
Group-IB Threat Intelligence
Technology Integration
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'Group-IB Threat Intelligence (Technology Integration)' }) }});"> More info -
Hail a TAXII
Technology Integration
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'Hail a TAXII (Technology Integration)' }) }});"> More info -
Hexillion CentralOps
Technology Integration
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'Hexillion CentralOps (Technology Integration)' }) }});"> More infoHexillion CentralOps
Technology Integration
The Central Ops.net integration enables analysts to investigate domains and IP addresses. This enricher provides registrant information, DNS records and more. All the information is delivered all in one report; making it much quicker and easier for the analyst. Unlike the free service, this paid account means that there is no limit on the amount of times you need to access the tool.
-
Hybrid Analysis
Technology Integration
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'Hybrid Analysis (Technology Integration)' }) }});"> More info -
IBM QRadar SIEM
Technology Integration
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'IBM QRadar SIEM (Technology Integration)' }) }});"> More infoIBM QRadar SIEM
Technology Integration
IBM QRadar SIEM consolidates log events and network flow data from thousands of devices, endpoints and applications distributed throughout a network. It normalizes and correlates raw data to identify security offenses, and uses an advanced Sense Analytics engine to baseline normal behavior, detect anomalies, uncover advanced threats, and remove false positives.
-
IBM QRadar SOAR
Technology Integration
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'IBM QRadar SOAR (Technology Integration)' }) }});"> More infoIBM QRadar SOAR
Technology Integration
IBM QRadar SOAR is the leading platform for orchestrating and automating incident response processes. IBM QRadar SOAR Platform quickly and easily integrates with your organization’s existing security and IT investments. It makes security alerts instantly actionable, provides valuable intelligence and incident context, and enables adaptive response to complex cyber threats. The latest innovation to IBM QRadar SOAR, Dynamic Playbooks, provides the agility, intelligence, and sophistication needed to contend with complex attacks.
-
Infoblox DNS, DHCP, AND IPAM (DDI)
Technology Integration
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'Infoblox DNS, DHCP, AND IPAM (DDI) (Technology Integration)' }) }});"> More infoInfoblox DNS, DHCP, AND IPAM (DDI)
Technology Integration
Infoblox DDI is a industry-leading, integrated, and centrally managed approach to delivering enterprise-grade DDI. It uses the patented Infoblox Grid TM technology to ensure high availability DNS, DHCP, and IPAM services throughout your distributed network. Infoblox DDI makes it easier for you to achieve higher levels service uptime, security, and operational efficiencies across diverse infrastructure, including on-prem, cloud and hybrid deployments.
-
Intel 471 Adversary Intelligence
Technology Integration
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'Intel 471 Adversary Intelligence (Technology Integration)' }) }});"> More infoIntel 471 Adversary Intelligence
Technology Integration
Intel 471 provides Adversary and Malware Intelligence for leading intelligence, security and fraud teams. Adversary Intelligence is focused on infiltrating and maintaining access to closed sources where threat actors collaborate, communicate and plan cyber-attacks. Malware Intelligence leverages our underground access to provide timely data and context on malware and adversary infrastructure.
-
Intel 471 Malware Intelligence
Technology Integration
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'Intel 471 Malware Intelligence (Technology Integration)' }) }});"> More infoIntel 471 Malware Intelligence
Technology Integration
Intel 471 provides Adversary and Malware Intelligence for leading intelligence, security and fraud teams. Adversary Intelligence is focused on infiltrating and maintaining access to closed sources where threat actors collaborate, communicate and plan cyber-attacks. Malware Intelligence leverages our underground access to provide timely data and context on malware and adversary infrastructure.
-
IntSights Alerts
Technology Integration
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'IntSights Alerts (Technology Integration)' }) }});"> More info -
Joe Sandbox
Technology Integration
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'Joe Sandbox (Technology Integration)' }) }});"> More info -
Kaspersky APT Intelligence Reporting
Technology Integration
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'Kaspersky APT Intelligence Reporting (Technology Integration)' }) }});"> More infoKaspersky APT Intelligence Reporting
Technology Integration
Exclusive, proactive access to Kaspersky’s most recent investigations and insights, revealing the methods, tactics and tools used by APT actors in high-profile cyberespionage campaigns with cross-sector targeting. Information provided in these reports allows to improve threat hunting missions and develop effective security use cases for proactive defense.
-
Kaspersky Threat Data Feeds
Technology Integration
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'Kaspersky Threat Data Feeds (Technology Integration)' }) }});"> More infoKaspersky Threat Data Feeds
Technology Integration
Context-rich and immediately actionable threat intelligence feeds containing information on suspicious and dangerous IPs, URLs and file hashes, enable efficient alert triage process while providing enough context to immediately identify alerts that need to be investigated or escalated to incident response team.
-
Kaspersky Threat Lookup
Technology Integration
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'Kaspersky Threat Lookup (Technology Integration)' }) }});"> More infoKaspersky Threat Lookup
Technology Integration
All the knowledge acquired by Kaspersky about cyberthreats, legitimate objects and their various relationships, brought together into a single, powerful web service. Real-time search of many petabytes of threat relationship data enables highly effective incident investigations and threat hunting.
-
MaxMind GeoIP
Technology Integration
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'MaxMind GeoIP (Technology Integration)' }) }});"> More info -
Micro Focus ArcSight ESM
Technology Integration
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'Micro Focus ArcSight ESM (Technology Integration)' }) }});"> More infoMicro Focus ArcSight ESM
Technology Integration
Micro Focus ArcSight ESM identifies and prioritize threats in real time so you can respond and remediate quickly. Correlate security logs from multiple data feeds, improve the accuracy of security alerts with complex use cases, and uncover advanced cyber attacks that previously went undetected.
-
Microsoft Sentinel
Technology Integration
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'Microsoft Sentinel (Technology Integration)' }) }});"> More infoMicrosoft Sentinel
Technology Integration
See and stop threats before they cause harm, with SIEM reinvented for a modern world. Microsoft Sentinel is your birds-eye view across the enterprise. Put the cloud and large-scale intelligence from decades of Microsoft security experience to work. Make your threat detection and response smarter and faster with artificial intelligence (AI). Eliminate security infrastructure setup and maintenance, and elastically scale to meet your security needs—while reducing IT costs.
-
MISP
Technology Integration
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'MISP (Technology Integration)' }) }});"> More infoMISP
Technology Integration
MISP is an open source platform that allows for easy IOC sharing among distinct organizations. With this MISP integration, threat analysts can ingest the IOCs they receive from MISP and apply their threat investigation and dissemination workflows right from EclecticIQ Platform. Download the Solutions Brief for more detailed information.
-
NSFocus
Technology Integration
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'NSFocus (Technology Integration)' }) }});"> More infoNSFocus
Technology Integration
The integration of NSFocus Global Intelligence includes both the feed and enricher. NSFocus Threat Intelligence, with its extensive sources, provides analysts with enricher information for IP addresses, Domains, CVEs and files. The NSFocus API allows analysts to work with the security event data as a feed. The cyber threat landscape in China is larger and more complex than anywhere else. With this integration, analysts have insight into world's largest numbers of Internet-connected devices and, vast numbers of Internet users.
-
NVD (National Vulnerability Database)
Technology Integration
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'NVD (National Vulnerability Database) (Technology Integration)' }) }});"> More infoNVD (National Vulnerability Database)
Technology Integration
The NVD (National Vulnerability Database) Vulnerability Intelligence Feed retrieves CVEs (Common Vulnerability and Exploits) from the NVD CVE API. NVD offers this as a free service -- any customer can use this integration. This integration mainly supports vulnerability management use-cases in the platform.
-
OpenPhish
Technology Integration
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'OpenPhish (Technology Integration)' }) }});"> More info -
Palo Alto Networks AutoFocus
Technology Integration
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'Palo Alto Networks AutoFocus (Technology Integration)' }) }});"> More infoPalo Alto Networks AutoFocus
Technology Integration
AutoFocus contextual threat intelligence brings speed, consistency and precision to threat investigation. It provides instant access to community-based threat data, enhanced with deep context and attribution from the Unit 42 threat research team, saving time and effort. Now teams can quickly investigate, correlate and pinpoint malware’s root cause without adding dedicated malware researchers or additional tools. Plus, automated protections make it simple to turn raw intelligence into protection across your environment.
-
Palo Alto Networks Cortex SOAR
Technology Integration
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'Palo Alto Networks Cortex SOAR (Technology Integration)' }) }});"> More infoPalo Alto Networks Cortex SOAR
Technology Integration
Cortex XSOAR helps simplify security operations by unifying automation, case management, real-time collaboration, and threat intelligence management. You can manage alerts across all sources, standardize processes with playbooks, take action on threat intelligence, and automate response options for virtually any use case to speed up investigations.
-
PhishTank
Technology Integration
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'PhishTank (Technology Integration)' }) }});"> More info -
Qualys
Technology Integration
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'Qualys (Technology Integration)' }) }});"> More infoQualys
Technology Integration
With VMDR, enterprises are empowered with visibility and insight into cyber risk exposure - making it easy to prioritize vulnerabilities, assets, or groups of assets based on business risk. Security teams can take action to mitigate risk, helping the business measure its true risk, and track risk reduction over time.
-
Recorded Future
Technology Integration
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'Recorded Future (Technology Integration)' }) }});"> More infoRecorded Future
Technology Integration
The Recorded Future integration provides both a feed and enricher capabilities. With the feed, users have access to the Recorded Future Risk List which includes IP and file hashes, for example. The results are provided in standard STIX/TAXII protocols including TTPs and Indicators. The enricher allows users to query Domains, hashes, URLs and IP addresses.
-
RIPEstat GeoIP / RIPEstat Whois
Technology Integration
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'RIPEstat GeoIP / RIPEstat Whois (Technology Integration)' }) }});"> More info -
RiskIQ PassiveTotal
Technology Integration
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'RiskIQ PassiveTotal (Technology Integration)' }) }});"> More info -
RSA NetWitness / Security Analytics
Technology Integration
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'RSA NetWitness / Security Analytics (Technology Integration)' }) }});"> More infoRSA NetWitness / Security Analytics
Technology Integration
Using the NetWitness app, RSA users are able to leverage the power of EclecticIQ Platform directly from the NetWitness interface. Users can receive IOCs from the platform to trigger security alerts, and send sightings back to EclecticIQ Platform.
-
Shodan
Technology Integration
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'Shodan (Technology Integration)' }) }});"> More info -
Silobreaker
Technology Integration
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'Silobreaker (Technology Integration)' }) }});"> More infoSilobreaker
Technology Integration
Silobreaker helps business, security and intelligence professionals make sense of the overwhelming amount of unstructured data on the web. By providing powerful tools and visualisations that cut through the noise and analyse data from hundreds of thousands of open sources, Silobreaker makes it easy for users to monitor and research threats or opportunities.
-
Splunk Enterprise Security
Technology Integration
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'Splunk Enterprise Security (Technology Integration)' }) }});"> More infoSplunk Enterprise Security
Technology Integration
* Operational Intelligence optimizes your IT, security and business performance * Collect operational data (including logs, clickstreams, sensors, stream network traffic, web servers, custom applications, hypervisors, containers, social media and cloud services) * Search, monitor and analyze data to discover powerful insights for security and IT operations. * Understand trends, patterns of activity and behavior to make more informed decision
-
Splunk SOAR
Technology Integration
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'Splunk SOAR (Technology Integration)' }) }});"> More info -
SpyCloud
Technology Integration
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'SpyCloud (Technology Integration)' }) }});"> More info -
Sumo Logic Cloud SIEM
Technology Integration
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'Sumo Logic Cloud SIEM (Technology Integration)' }) }});"> More infoSumo Logic Cloud SIEM
Technology Integration
Sumo Logic Cloud SIEM provides security analysts and SOC managers with enhanced visibility across the enterprise to thoroughly understand the scope and context of an attack. Automated parsing, mapping and normalization of records from your structured and unstructured data is correlated in real time to detect threats, enabling streamlined SOC workflows designed to detect known and unknown threats faster. Configurable as a custom integration.
-
Sumo Logic Cloud SOAR
Technology Integration
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'Sumo Logic Cloud SOAR (Technology Integration)' }) }});"> More infoSumo Logic Cloud SOAR
Technology Integration
Automate real-time threat investigation, incident management and threat response while reducing false positives and analyst fatigue with Sumo Logic Cloud SOAR. Leverage hundreds of pre-built integrations with leading third-party threat intelligence vendors to help secure operations, automate incident response and reduce time to remediation. Configurable as a custom integration.
-
Symantec DeepSight Intelligence Datafeeds
Technology Integration
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'Symantec DeepSight Intelligence Datafeeds (Technology Integration)' }) }});"> More infoSymantec DeepSight Intelligence Datafeeds
Technology Integration
Leveraging the extensive Symantec Global Intelligence Network, this integration feed allows users to collect raw intelligence data making it available within EclecticIQ Platform. The feed provides a broad range of insights, covering reputation and threat intelligence data for IP, URLs, attacks, bots, cnc, malware, fraud, and phishing.
-
The National Cyber-Forensics and Training Alliance (NCFTA)
Technology Integration
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'The National Cyber-Forensics and Training Alliance (NCFTA) (Technology Integration)' }) }});"> More infoThe National Cyber-Forensics and Training Alliance (NCFTA)
Technology Integration
The NCFTA was created by industry, academia, and law enforcement for the sole purpose of establishing a neutral, trusted environment that enables two-way information sharing with the ultimate goal to identify, mitigate, disrupt, and neutralize cyber threats.
-
Threat Crowd
Technology Integration
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'Threat Crowd (Technology Integration)' }) }});"> More infoThreat Crowd
Technology Integration
ThreatCrowd is an Open Source system for finding and researching artefacts relating to cyber threats, utilizing information obtained by crawling various Open Source resources, including VirusTotal and Malwr.ThreatCrowd is an Open Source system for finding and researching artefacts relating to cyber threats, utilizing information obtained by crawling various Open Source resources, including VirusTotal and Malwr.r
-
Vigilante
Technology Integration
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'Vigilante (Technology Integration)' }) }});"> More infoVigilante
Technology Integration
Vigilante is a global threat hunting and dark web cyber intelligence research team, delivering a combination of vast, unique human intelligence and automation that is targeted for each client to help them identify their biggest risks and defend against the most sophisticated adversaries.
-
VirusTotal
Technology Integration
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'VirusTotal (Technology Integration)' }) }});"> More infoVirusTotal
Technology Integration
With VirusTotal users can analyze suspicious files and URLs. It facilitates the quick identification of viruses, worms, trojans and all kinds of malware. Integrating VirusTotal means that users don’t need to leave EclecticIQ Platform – everything is at your fingertips which saves time and minimizes the number of tools open at once. The integration supports the premium service for feeds and enrichers; plus, the free service for enrichers. VirusTotal helps users by providing more condensed, ingestible and corroborable information.
-
VMRay
Technology Integration
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'VMRay (Technology Integration)' }) }});"> More infoVMRay
Technology Integration
Surmounting the persistent shortcomings of other DFIR tools, VMRay delivers rapid detection results and in-depth analysis reports without compromising performance or security. VMRay flexibly integrates with other systems, automating the submission of files and URLs for analysis. Precise, actionable results are returned that drive block/allow decisions and other security measures across the enterprise.
-
Webroot
Technology Integration
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'Webroot (Technology Integration)' }) }});"> More info -
Zscaler
Technology Integration
{ if(typeof dataLayer !== 'undefined') { dataLayer.push({ 'event': 'card-clicked', 'clickedLabel': 'Zscaler (Technology Integration)' }) }});"> More infoZscaler
Technology Integration
Zscaler accelerates digital transformation so that customers can be more agile and secure. The Zscaler Zero Trust Exchange, a SASE-based platform, is the world’s largest inline cloud security platform, protecting thousands of customers from cyberattacks and data loss by securely connecting users, devices, and applications over any network. Zscaler integrates with EclecticIQ by consuming high-confidence indicators to enforce real-time policies and ensure all users get complete protection from emerging threats and targeted attacks.