Demo: EclecticIQ’s Intelligence Center's hub-and-spoke model
This demo recording shows how to leverage EclecticIQ’s Intelligence Center for sharing intel between different agencies and organizations in an intelligence sharing network.
Watch RecordingEclecticIQ Empowers a National CERT’s Collaborative Threat Intelligence Sharing Community
Implementing a unique hub-and-spoke TIP architecture lowers false positives, enhances collaboration, and improves cyber situational awareness and resilience
Download Case StudyCase study: A Financial Heavyweight Makes Threat Intelligence Actionable
A 30-minute presentation and demonstration shows how a world-class CTI team has made threat intelligence actionable by replacing their previous threat intelligence platform (TIP) with EclecticIQ Intelligence Center.
Watch Recording5 Questions to Ask About Your EDR
Five often-overlooked criteria you should set when selecting an EDR solution. Ensure you’re getting true visibility into all platforms, real integration, and comprehensive response capabilities.
Download White PaperA Financial Heavyweight Makes Threat Intelligence Actionable with EclecticIQ Intelligence Center
A case study of how a financial heavyweight makes threat intelligence actionable with EclecticIQ Intelligence Center
Download Case StudySANS Webcast: While You Were in Lockdown - Cyberattacks Against Decentralized Finance Had a Banner Year
How threat actors and cyberattacks are consolidating around emerging targets of the decentralized finance powerhouse.
Watch RecordingSANS 2022 Cyber Threat Intelligence Survey ()
Read the full report to learn what trends SANS has discovered and to get guidance on how you can get the most out of CTI.
Download Survey ReportWebcast - Delivering Comprehensive Cybersecurity for SMBs
AaDya Security and EclecticIQ have partnered to deliver the might of an osquery-based EDR with the smarts of Judy, an AI-powered, all-in-one platform, to provide 24x7 protection for small and midsize businesses (SMBs).
Watch RecordingEclecticIQ Analyst Workflow Training
Train your entire team on EclecticIQ Intelligence Center to jumpstart CTI analysis and threat tracking.
Download Product DescriptionRecorded Future and EclecticIQ Intelligence Center
With EclecticIQ’s integration of Recorded Future, analysts quickly prioritize indicators of compromise (IOCs). Using the Intelligence Center’s graph and advanced search functions, analysts can promptly align these IOCs to tactics, techniques, and procedures (TTPs).
Download Solutions BriefGroup-IB and EclecticIQ Intelligence Center
As the analyst-centric TIP, EclecticIQ Intelligence Center now provides unparalleled visibility and insights into the threat landscape by integrating the widest range of Group-IB Intelligence data. This data comes from closed sources, real-life investigations, joint ops with law enforcement, and a global technology grid to dive deep into tactics, techniques, and procedures (TTPs).
Download Solutions BriefThe Tradecraft of a Successful Threat Investigation: A COVID-19 Case Study
What does it take to run a successful threat investigation with global implications? Since February 2020, we at EclecticIQ have tracked adversaries as they put their malicious tactics, techniques, and procedures (TTPs) into high gear to take advantage of organizations shifting focus from security to the COVID-19 health crisis.
Download White PaperThreat Data Ingestion: Get the Best of Both Worlds
Selecting a threat intelligence platform (TIP) is a complex decision that often puts the CTI and the IT Ops teams at odds with each other. The CTI team demands high-fidelity threat data. The IT Ops team requires a TIP with predictable and manageable scalability.
Download White PaperEclecticIQ Platform and Packages
Introducing EclecticIQ Platform for intelligence, hunting, and delivering threat intelligence automation and collaboration, forensic-depth endpoint visibility, and threat detection and response.
Download Product DescriptionTIP For SOC Package
The EclecticIQ TIP for SOC package enables enterprises and government agencies to pivot from a reactive, alert-led operation to a proactive, intelligence-led operation. With this pivot, SOC teams overcome the overwhelming flood of alerts and IOCs to focus on adversary tactics, techniques, and procedures (TTPs).
Download Product DescriptionTIP For CTI Package
The EclecticIQ TIP for CTI package provides central governments and large enterprises with analyst-centric capabilities to move beyond the limitations of open source or homegrown tools and rudimentary TIPs to execute a state-of-the-art, in-house CTI practice.
Download Product DescriptionEclecticIQ Endpoint Response for MSSPs
EclecticIQ helps MSSPs succeed with a single lightweight agent that provides both extensive multi-OS data collection and analysis as well as comprehensive response capabilities – all with lower CapEx and OpEx outlays than traditional EDR tools.
Download Product DescriptionEclecticIQ Endpoint Response for Incident Responders
Turbocharge your IR practice with a cost-friendly offering that includes generous initial rollout allowances, rapid deployment and assessment capabilities, and built-in response capabilities to minimize time to remediation.
Download Product DescriptionEclecticIQ Intelligence Center
EclecticIQ Intelligence Center is the only threat intelligence solution that unites machine-powered threat data processing and dissemination with human-led data analysis without compromising analyst control, freedom, or flexibility.
Download Product DescriptionUsing a Robust Platform for Training Purposes
Cyber threat analysts are hard to find, and are being heavily recruited by enterprises and governments. The problem is that threat intelligence has a steep learning curve, even for IT professionals in related fields. That’s why Cyber Threat Intelligence Network (CTIN) advocates a new approach to training cyber threat analysts: Use a Threat Intelligence Platform (TIP) as a hands-on instructional tool.
Download White PaperTriage & Collaboration: Improving a major bank's cyber threat security posture
Learn how a major bank implemented a single Threat Intelligence Platform (TIP) to support multiple lines of business across its global footprint.
Download Case StudyToward a Holistic Cyber Threat Intelligence (CTI) Program
Report by Enterprise Strategy Group (ESG) Jon Oltsik, Senior Principal Analyst on operationalizing Cyber Threat Intelligence through a holistic approach [Aug-2017]
Download Analyst ReportBuilding a Threat Intelligence Practice
How to make threat intelligence relevant to executives, business stakeholders, security operations and incident responders.
Download White PaperSTIX 2.1 - A More Robust Approach to Intelligence Sharing
This White Paper highlights the exciting improvements with STIX 2.1 and its value as an exchange, interoperability, and transformation standard.
Download White PaperAugment your SOC with human-led threat intelligence
Learn about the limitations of automation in the Security Operations Center. Find out why SOCs should let humans take the lead in handling intelligence. Discover how to achieve the benefits of an integrated, intelligence-led cyber defense capability powered by a Threat Intelligence Platform.
Download White PaperAccelerate Incident Response with Threat Intelligence
This paper explains how Threat Intelligence improves Incident Response (IR) and how to introduce Threat Intelligence into your IR practice - with two use cases from Fox-IT.
Download White PaperHow to overcome the Threat Intelligence Cycle Paralysis?
Demonstration on how to overcome threat intelligence paralysis by using a ransomware campaign and botnet threat, by providing context through their relationships with each other and additional threats.
Watch RecordingApplying the Threat Intelligence Maturity Model to your organization
This paper provides a framework to assess the maturity of threat intelligence efforts and guide future investments.
Download White PaperMake Sure Your Organization Is Mature Enough for SOAR
Complimentary Analyst Report 'Make Sure Your Organization Is Mature Enough for SOAR' by Gartner.
Download Analyst ReportSANS Cyber Threat Intelligence Survey Report 2020
Download your complimentary copy now
Download Survey ReportCTI-Powered Cyber Security Operations
EclecticIQ and Kaspersky came together to present a Webinar for Practitioners, by Practitioners. We demonstrated the benefits of a security operation center (SOC) powered by cyber threat intelligence (CTI)—and we’re proving our findings with live demos.
Watch RecordingNarrator: Generating Intelligence Reports from Structured Data
Explore the role of Natural Language Generation (NLG) in the cyber threat intelligence domain.
Watch RecordingPreventing Cybercrime with SOC Augmentation
The Kaspersky and EclecticIQ collaboration on their portfolio of integrations guarantees high-end Cyber Threat Intelligence analysis, empowering organizations to stay ahead of cybercrime. This webinar shows the strength of our combined portfolio and offering, with a product demonstration.
Watch RecordingLessons Learned Implementing Intelligence-led Security
We have invited Carol Geyer, Chief Development Officer from OASIS, to discuss how the adoption of STIX and TAXII might transform the CTI practices of organizations. Further, during this webinar we will look at some of the issues that central government and enterprises face, when setting up CTI capabilities.
Watch RecordingHow to Leverage CTI to Defend From Ransomware
How CTI can be leveraged in practical terms from a tactic and a strategic point of view.
Watch RecordingCTI Collaboration Using STIX and Elasticsearch
In this talk we explore the concepts that underpin true intelligence collaboration and describe a means to achieve it using STIX and elasticsearch.
Watch RecordingEclecticIQ Threat Intelligence Consultants
Leverage Threat Intelligence Consultants to supercharge your threat intelligence operations and optimize your EclecticIQ Intelligence Center.
Download Product DescriptionMISP and EclecticIQ Intelligence Center
By integrating MISP (Malware Information Sharing Platform) into EclecticIQ Intelligence Center, not only do you benefit from MISP’s strong sharing capabilities and extensive community connections, but you also leverage the analyst-centric functionality from EclecticIQ Intelligence Center.
Download Solutions BriefQualys and EclecticIQ Intelligence Center
With EclecticIQ Intelligence Center’s built-in integration with Qualys, your SOC and CTI teams augment vulnerability prioritization – and remediation – based on real-world threats. EclecticIQ’s enrichment of alerts and telemetry and targeted Knowledge Packs ensure that SOC and vulnerability management (VM) analysts focus on probable rather than possible to optimize SOC operations.
Download Solutions BriefIntel 471 and EclecticIQ Intelligence Center
EclecticIQ and Intel 471’s combined solution helps organizations dig deep to detect and prevent cyber underground threats. Threat intelligence teams can master their threat landscape by integrating Intel 471’s cybercrime intelligence with EclecticIQ Intelligence Center.
Download Solutions BriefKaspersky Intelligence and EclecticIQ Intelligence Center
With EclecticIQ and Kaspersky, organizations can shift their operations to proactive threat management by speeding up CTI operations as analysts identify the most critical threats faster, take timely action sooner and advise the organization on how to respond better.
Download Solutions BriefGartner Market Guide for Security Threat Intelligence Products
The 2019 'Gartner Market Guide to Security Intelligence Products and Services' by Craig Lawson, Ryan Benson, and Ruggero Contu.
Download Analyst ReportTime to Soar with EclecticIQ and Splunk
With EclecticIQ Intelligence Center's built-in integration with Splunk Enterprise and Splunk Phantom, your SOC, SOAR, and CTI teams prioritize and accelerate their threat response.
Download Product DescriptionSilobreaker and EclecticIQ Intelligence Center
Together, EclecticIQ and Silobreaker help threat intelligence teams integrate structured and unstructured threat data, contextualize unique indicators, and respond faster to impending threats.
Download Solutions BriefUnderstanding the Ransomware Landscape
This talk consists of 3 main parts: a historical overview of the ransomware phenomenon, how Cyber Threat Intelligence driven security can prevent a ransomware attack by providing the strategic, operational and tactical intelligence, and a description of a worst case scenario resulting from a successful ransomware attack against a targeted victim.
Watch RecordingEclecticIQ Curated Feeds
With curated and optimized Open Sources and Commercial Sources feeds from EclecticIQ, your CTI team will overcome feed marketplace overload, jumpstart their CTI operations, and expand their threat landscape visibility.
Download Product DescriptionBeyond the IOC with Cyber Threat Intelligence (CTI)
Indicators of Compromise (IOCs) have their place in cybersecurity, but as cyber threats evolve, they have become ineffective in threat detection. In order to detect the techniques, tactics and procedures (TTPs) of adversaries as well as to fully understand and anticipate threats, we have to go Beyond the IOC with structured intelligence.
Download White PaperRansomware as a Smokescreen for Nation-State Sponsored Espionage Operations
There is a general consensus around the financial motivation behind ransomware campaigns. While this holds true, in this presentation we are going to look into alternative hypotheses where cyber-criminal gangs cooperate with nation states to target victims in order to steal data of value for the nation state sponsoring the operation, hiding the nation state attribution and the espionage motive behind the cyber-criminal gang attribution and financial motive.
Watch RecordingFlashpoint and EclecticIQ Intelligence Center
EclecticIQ Intelligence Center now integrates Flashpoint’s trusted actionable intelligence to provide CTI and SOC analysts with the insights they need to make better decisions, respond sooner, and move faster.
Download Solutions BriefAzure Sentinel and EclecticIQ Intelligence Center
Together, EclecticIQ Intelligence Center and Azure Sentinel facilitate SOC and CTI teams gaining actionable insights, sharper threat pattern visualizations, and instant situational awareness.
Download Solutions Brief