Threat Intelligence and the use of data to flag critical security indicators were popular topics in Las Vegas at the Black Hat conference in early in August –and for good reason. As enterprises struggle to understand their network vulnerabilities, they have to consider the many layers of defense needed to secure their most valuable data. Security teams are inundated with threat data and overburdened by the need to allot countless man-hours to the task of weeding out the noise from the real threats.
A decade ago, the majority of threat intelligence (TI) occurred in the departments and agencies of the federal government. Now that the needs of the business world have created a demand for threat intelligence, many feds are jumping into the private sector, bringing with them a wealth of knowledge of protocols they can apply to developing commercial products.
Vendors are increasingly creating customer-centric products that’ll make it easier for analysts to do their jobs. A variety of these platforms can be customized to meet the individual needs of different enterprises. Understand, though, that knowledge of these kinds of products is only one part of a mature TI program: organizations also need to conduct an internal risk assessment and design a plan of action.
While TI is fast becoming a crowded category boasting a wide range of platforms and services, these eight products will help any security team make valuable use of their threat data, and tailor a TI program that’s right for their company.