One of our customers works in the public sector for the Saudi government, and we proposed a subscription model for the Threat Grid solution. I think we had a POC before, and the customer liked the concept of Threat Grid. He already had security infrastructure from Cisco, and this would be a seamless integration between Cisco products and with the Cisco Threat Grid. So the use case would be the smooth integration between Cisco security products and Threat Grid.
Our primary use case is to use it to identify unknown files. It checks to see if it's a malicious file or a clean file because this is a sandboxing solution which is why it's used on-prem. They don't want to share their own files to the cloud so they use it on their own prem-solutions. It checks even static or dynamic checking to see if it's clean or it's malicious then it makes a verdict.
Find out what your peers are saying about Cisco, Palo Alto Networks, ThreatConnect and others in Threat Intelligence Platforms (TIP). Updated: April 2026.
Threat Intelligence Platforms improve an organization's cybersecurity by collecting and analyzing threat data. They offer insights into potential cyber threats, enabling proactive security measures to protect networks.These platforms help organizations manage and analyze threat data from different sources, providing a comprehensive view of potential threats. By integrating seamlessly with existing security systems, TIPs enhance the decision-making process for security teams, enabling them to...
The solution is used for endpoint security.
One of our customers works in the public sector for the Saudi government, and we proposed a subscription model for the Threat Grid solution. I think we had a POC before, and the customer liked the concept of Threat Grid. He already had security infrastructure from Cisco, and this would be a seamless integration between Cisco products and with the Cisco Threat Grid. So the use case would be the smooth integration between Cisco security products and Threat Grid.
Our primary use case is to use it to identify unknown files. It checks to see if it's a malicious file or a clean file because this is a sandboxing solution which is why it's used on-prem. They don't want to share their own files to the cloud so they use it on their own prem-solutions. It checks even static or dynamic checking to see if it's clean or it's malicious then it makes a verdict.