Security Engineer at Jiangsu Zhongtian Technology Co., Ltd.
Real User
Top 10
2025-05-14T09:37:00Z
May 14, 2025
Mainly, we use ThreatBook TDP to monitor the east-west and north-south network traffic, detect abnormal behaviors, and provide contextual intelligence to support our threat hunting and incident response. ThreatBook helps with our threat hunting and incident response by providing very high accurate threat intelligence, aggregating all the alerts from attacker perspectives, and showing me all the attack paths, which helps us easily to do the attribution and threat investigation. One more thing is that ThreatBook has very low false positives, which allows us to focus on the real threats and reduces a lot of work on noise reduction. During incident response scenarios, ThreatBook saves us over 80% of time for each incident, reducing the usual time taken from one or two days for attribution to just one or two hours, thanks to their AI techniques that allow me to ask in natural language to explain the meaning and the target of the attacker.
Threat Intelligence Platforms help organizations identify, analyze, and mitigate cyber threats through comprehensive data aggregation, real-time threat detection, and actionable insights.
These platforms offer advanced capabilities to gather threat data from multiple sources, enabling security teams to make informed decisions and respond promptly to potential threats. They integrate with existing security infrastructure and provide customizable dashboards for easier monitoring.
...
Mainly, we use ThreatBook TDP to monitor the east-west and north-south network traffic, detect abnormal behaviors, and provide contextual intelligence to support our threat hunting and incident response. ThreatBook helps with our threat hunting and incident response by providing very high accurate threat intelligence, aggregating all the alerts from attacker perspectives, and showing me all the attack paths, which helps us easily to do the attribution and threat investigation. One more thing is that ThreatBook has very low false positives, which allows us to focus on the real threats and reduces a lot of work on noise reduction. During incident response scenarios, ThreatBook saves us over 80% of time for each incident, reducing the usual time taken from one or two days for attribution to just one or two hours, thanks to their AI techniques that allow me to ask in natural language to explain the meaning and the target of the attacker.