Solutions
Threat Intelligence

    Threat IntelligenceNEW

    Exhibitor 
    Product Category
    Threat Intelligence
    Product Features
    辨識並優先處理與企業相關的威脅
    偵測威脅並更快速地做出回應
    可視化暗網來源
    Product Description

    Recorded Future's Threat Intelligence Module enables rapid detection of critical threats and proactive defense against emerging threats.

    .Threat Map

    Automatically visualizes threat actors, third parties, and malware relevant to your organization, actively identifying, analyzing, and responding to evolving network threats. Prioritize addressing threats that have a significant impact on your organization.

    .Sandbox

    A sandbox solution prioritizing speed and scalability. It automatically records through an API, providing a fully customizable environment with real-time control over detonation and malware tagging. It supports your investigations and proactive mitigation measures. Advanced Query Builder:

    Conduct deep targeted searches within Recorded Future's intelligence repository based on your requirements. Intelligence can be saved and shared for easy team access to relevant content.

    .Custom Alerting

    Tailored to your needs, receive real-time notifications via email, mobile app, or portal when new intelligence is identified. For example, alerts for a customer's domain mentioned on a dark web market in a specific country, investigation alerts, and findings of interesting Indicators of Compromise (IOCs). Access necessary YARA/Sigma rules for further analysis and mitigation.

    .Threat Hunting Packages

    Provide your team with detection mechanisms, including YARA, Snort, and Sigma rules, for hunting adversaries, malware, or traffic of interest.

    .Integrations

    Deliver real-time, machine-readable intelligence into the security technologies you already use. Automation is facilitated through intelligent integrations and a simple API for privileged management.

    Browse other exhibited products by Recorded Future.
    Identity Intelligence
    Identity Governance
    Identity Intelligence
    Brand Intelligence
    Digital Risk Protection
    Brand Intelligence
    Third-Party Intelligence
    Third-Party Risk Management
    Third-Party Intelligence
    Vulnerability Intelligence
    Vulnerability Management
    Vulnerability Intelligence
    Attack Surface Intelligence
    Threat Intelligence
    Attack Surface Intelligence
    SecOps  Intelligence
    Security Automation
    SecOps Intelligence
    Geopolitical Intelligence
    Threat Intelligence
    Geopolitical Intelligence
    Payment Fraud Intelligence
    Fraud Detection
    Payment Fraud Intelligence