Delivery Manager at a tech services company with 1,001-5,000 employees
Real User
Top 5
2021-06-08T10:30:00Z
Jun 8, 2021
Presently, I am using the Threat Intel solution for reputation checks in our daily SOC operations and threat hunting. We also use it for our alert detection and rule development in our SIEM solution. This can also be used for real-time suspicious threat detection. We use the technology for static threat hunting and looking for suspicious activities around the infrastructure. SOC Operations use the dashboards to look for active threats to present security posture to our client on a daily, weekly, and monthly basis.
Threat Intelligence Platforms offer organizations tools to identify, assess, and manage cyber threats efficiently. They integrate with existing security systems, enhancing threat detection and response capabilities to ensure robust cybersecurity defenses.These platforms aggregate and analyze threats from numerous sources, providing valuable insights into potential vulnerabilities and attack vectors. They are essential for organizations looking to streamline their cybersecurity efforts by...
Presently, I am using the Threat Intel solution for reputation checks in our daily SOC operations and threat hunting. We also use it for our alert detection and rule development in our SIEM solution. This can also be used for real-time suspicious threat detection. We use the technology for static threat hunting and looking for suspicious activities around the infrastructure. SOC Operations use the dashboards to look for active threats to present security posture to our client on a daily, weekly, and monthly basis.