Threat Intelligence
Overview
Threat Intelligence is a crucial component of the Secure60 platform, providing valuable insights to detect, prevent, and respond to cyber threats. We offer two main types of Threat Intelligence:
- Built-in Threat Intelligence
- Third-party Threat Intelligence
We support both options to ensure comprehensive coverage and flexibility for your security needs.
Built-in Threat Intelligence
Our Built-in Threat Intelligence leverages a combination of open-source and private data sources to provide a robust foundation of threat information. This includes:
- Open Source Data Sources: Leveraging publicly available threat intelligence feeds, we apply filtering to ensure accuracy and freshness which ensures accurate and up-to-date information on emerging threats.
- Private Data Sources: Utilizing proprietary data sources to enhance threat detection and enrich the overall intelligence.
Features
- Comprehensive Coverage: Aggregates data from multiple open source and private sources.
- Real-time Updates: Continuously updated to reflect the latest threat landscape.
- Smart Analytics: Remove false positives through automated analysis of packet sizes, protocol types and more
- Customizable: Allows for tailored threat intelligence based on your specific requirements.
Third-party Threat Intelligence
We also integrate with external Threat Intelligence providers to offer an additional layer of security. This integration allows you to benefit from the expertise and resources of leading threat intelligence services.
Supported Providers
We support integration with various third-party Threat Intelligence providers, contact support with details of the specific provider you want to enable to have this activated.
Features
- Enhanced Security: Access to a wider range of threat intelligence data from specialized providers.
- Seamless Integration: Easily integrate third-party threat intelligence services with our platform.
- Scalability: Supports scaling your threat intelligence capabilities as your security needs grow.
Getting Started
To start using Threat Intelligence in Secure60, follow these steps:
-
Enable Built-in Threat Intelligence:
- Threat Intelligence is enabled on each Project by default
- To managed settings, Navigate to the Threat Intelligence settings in the Secure60 portal (Project Settings page under “Modules”)
- You can tune features such as score of Threats detected, Adding items to Allow Lists and more
-
Integrate Third-party Threat Intelligence:
- Contact Secure60 Support with details of your specific provider and we will enable on your Secure60 account.