Dedicated Threat Intelligence Solution Enables ISAC/ISAO Members to Enhance Threat Intelligence Sharing with their ISACs/ISAOs
Cyware, the industry’s only Virtual Cyber Fusion platform provider, unveiled CTIX Spoke, a dedicated threat intelligence processing and collaboration platform that enables ISAC/ISAO members to automatically ingest as well as share threat intelligence back with their ISAC/ISAO. CTIX Spoke allows ISAC/ISAO members to take necessary actions on ingested threat intelligence, thereby helping security teams achieve crucial threat visibility and better protect their infrastructure from advanced attacks.
Recommended ITech News: Full Armor SSHepherd Completely Removes SSH, RDP, and Application Attack Surface Ports from Scans
Today, @CywareCo unveiled CTIX Spoke, a dedicated threat intelligence processing and collaboration platform that enables ISAC/ISAO members to automatically ingest as well as share threat intelligence back with their ISAC/ISAO. #TIP #ThreatIntelligence
“Smaller security teams have historically had difficulty sifting through and prioritizing copious amounts of threat data to turn intelligence into actionable insights. Adding to that, enterprise threat intelligence platforms are often out of reach for growing security teams due to limited resources,” said Avkash Kathiriya, VP of Research and Innovation at Cyware. “CTIX Spoke is purpose-built to offer an accessible threat intelligence module for ISAC/ISAO members interested in operationalizing threat indicators (IOCs) shared by their ISACs/ISAOs and other threat intelligence feed sources. With CTIX Spoke, security teams can achieve threat intelligence automation within their existing environments, helping them to quickly and accurately identify potential threats and take action swiftly.”
CTIX Spoke allows security teams to receive, view, and automatically action threat indicators of compromise (IOCs) from their ISAC/ISAO or other threat intelligence sources. ISAC/ISAO members can automatically action intelligence feeds directly in security tools using the built-in out-of-the-box SIEM Connectors and SOAR integrations, enabling a constant flow of threat intelligence sharing between ISACs/ISAOs and their members.
Recommended ITech News: Local Security Partners With RapidSOS to Send Multimedia Incident Data to 911
How is CTIX Spoke different from an Enterprise Threat Intelligence Platform (TIP)?
Enterprise threat intelligence platforms (TIPs) are typically designed for large security teams with advanced security maturity, large infrastructure, and a high budget. As a result, security teams with limited resources and budgets are left out and cannot operationalize the threat intelligence they receive from their ISACs/ISAOs. CTIX Spoke solves this problem for growing security teams by offering an affordable threat intelligence processing and collaboration solution that enables bidirectional sharing, analysis, and actioning of threat intelligence (IOCs) sourced from ISACs/ISAOs and other STIX 2.x sources.
Who can avail CTIX Spoke?
Only those organizations who are members of an ISAC/ISAO can avail CTIX Spoke.
How can ISAC/ISAO Members avail CTIX Spoke?
ISAC/ISAO members can reach out to their respective ISAC/ISAO (preferred) or the Cyware team to avail CTIX Spoke.
How much does CTIX Spoke cost?
Unlike enterprise threat intelligence platforms that are expensive, CTIX Spoke is highly affordable and aligns with most security budgets.
How Can My ISAC/ISAO benefit from CTIX Spoke if they are not using CTIX Enterprise?
ISACs/ISAOs who wish to increase their threat intelligence sharing capabilities and improve member CTI ingestion can deploy CTIX Enterprise, presently being used by more than 15 large ISACs/ISAOs, as their hub. This will allow their members to leverage CTIX Spoke for facilitating automated bidirectional threat intelligence sharing with them.
Recommended ITech News: Cradlepoint Expands AT&T 5G for Enterprise Solutions with Certification of W4005 Wideband Adapter for Ultra-High-Speed Connectivity