ThreatConnect now provides one place to visualise your intelligence and operations

In an effort to provide its customers with the most efficient way to gain insight into and situational awareness of their security and intelligence,ย ThreatConnect, Inc.ยฉ, provider of the industry’s only extensible, intelligence-driven security platform, is introducing new platform features and capabilities. With built-in and customisable dashboards and the new TAXII server in ThreatConnectโ€™s latest release, users will be able to derive more metrics-based insights into threats and the actions teams take in response.

Withย ThreatConnect Dashboards, TC ManageTM, TC AnalyzeTM, and TC CompleteTMย customers are able to easily visualise data that displays the impact of their security efforts and gain a better understanding of the threats their organisations face.ย  Customers are able to automatically monitor their security operations and intelligence in a way that is actionable and relevant for their teams. By viewing the built-in dashboards or creating their own and adding custom metrics – even from outside of ThreatConnect – analysts are able to make critical security operations decisions and act to mitigate them quickly.

With the power of data to gauge and observe trends, activities, and performance, the dashboard feature provides customers the ability to:

  • See meaningful data immediately: monitor recent history, open tasks, active incidents, false positives and more. Also, there is an added capability to view specific data and dig deeper from the dashboard.
  • Build insightful dashboards:ย prioritise how information is viewed and determine the best way to display the information using a variety of charts and graphs.
  • Personalise dashboards:ย teams are able to build and configure their own dashboards for their own use or to share with others in the organisation.

Andy Pendergast, vice president, product at ThreatConnect, said, โ€œDashboards is a powerful feature that will provide valuable insights to our customers from all the systems and data that they plug into Threatconnect, which differentiates us from other vendors in our space. Our customers wonโ€™t need to log into multiple systems to get a clear picture of their intel and operations. Plus, they will be able to share the impact of their efforts and the resulting intelligence with their security team and other staff.โ€

Also in this release, ThreatConnect will offer a TAXII Server. Now customers can seamlessly manage TAXII-client enabled systems and tools that ingest data with the increasingly adopted STIX-TAXII standards. Security professionals who need to share enriched intelligence in a standardised way with other groups or associations are now able to connect a variety of TAXII clients directly in theย ThreatConnect Platform,ย as well as leverage STIX-compliant data not found anywhere else (threat rating, confidence rating, and ThreatConnectโ€™s proprietary ThreatAssess score).

Pendergast added, โ€œBeing able to just pass STIX data is not enough. It could just add more noise. You have to be able aggregate all of your threat data in one place, leverage our analytics to filter what’s relevant and then distribute it to your security tools and systems seamlessly with confidence. With ThreatConnect, we put curated and relevant threat intelligence to work to reduce your time to detect and respond to threats.โ€

ย 

Website | + posts

Lead Editor for "Future Story Of" an exciting new brand coming soon!
Social Media Manager for Compare the Cloud and Disruptive Live.

Fluent in French, would like to live in a castle, owns a french bulldog called Pepper Pig.

Unlocking Cloud Secrets and How to Stay Ahead in Tech with James Moore

Newsletter

Related articles

A Business Continuity Cheat Sheet

Right, let's be honest. When you hear "business continuity,"...

Challenges of Cloud & Ultima’s Solution to Transform Business

With the way that AWS and Microsoft dominate technology...

Data privacy concerns linger around LLMs training

We have all witnessed the accelerated capabilities of Large...

Securing Benefits Administration to Protect Your Business Data

Managing sensitive company information is a growing challenge. Multiple...

Which Cloud Type Suits You โ€“ Public, Private, Hybrid?

Valuable lessons have been learnt about cloud deployments over...