CIO Influence
Analytics CIO Influence News Security

Introducing ThreatConnect 6.4 Improving Threat Intelligence Processes and SOC Metrics

Introducing ThreatConnect 6.4 Improving Threat Intelligence Processes and SOC Metrics
Latest release allows for threat intelligence analysts to easily build and enhance their threat library and understand threats with deeper global context

ThreatConnect Inc., the leader in enabling a risk led and intelligence-driven security is announcing ThreatConnect 6.4, which introduces new capabilities that allow security operations and cyber threat intelligence (CTI) analysts to get useful context faster during investigations and to better measure team efficiencies.

“With the release of ThreatConnect 6.4 we’re making good on our vision and promise to security operations and cyber threat intelligence teams to deliver capabilities that will allow them to make decisions faster with more relevant context”

ThreatConnect combines its Threat Intelligence Platform (TIP) and Security Orchestration and Automation platform (SOAR), creating a continuous feedback loop that helps make Intelligence-Driven Operations a reality. This latest product release builds upon the foundation of Intelligence-Driven Operations, empowering the workflow of threat intelligence and security operations teams individually and together.PREDICTIONS SERIES 2022

Top iTechnology Networking News: Gilead and AWS Collaborate on Development and Delivery of New Medicines for Patients

The 6.4 release helps CTI and security operations center (SOC) teams get more context quickly, enabling faster investigations for both. CTI teams are enabled to more easily build and maintain a dynamic threat library, while updated dashboards allow SOC and IR leaders to accelerate the team’s efficiency. Three new features empower these capabilities:

  • Explore With CAL™ to better understand the complex relationships of threat indicators with a graph-based interface into our Collective Analytics Layer
  • Browser Extension V2 to build context around threats quickly and enhance your threat library
  • New Workflow Metrics to drive operational efficiencies, helping SOC teams learn how to optimize their tools, team processes, and automations

“With the release of ThreatConnect 6.4 we’re making good on our vision and promise to security operations and cyber threat intelligence teams to deliver capabilities that will allow them to make decisions faster with more relevant context,” said Andy Pendergast, co-founder and EVP of Product at ThreatConnect. “We’re enabling insights across teams to help them observe and orient to threats to their environment faster with intelligence, and then decide and act at scale with our robust orchestration and automation capabilities.”

Top iTechnology AIOps News: Adjuvare Launches Real-Time Remote Patient Monitoring Combining AI Mobile Technology and Virtual Acute-Care Services

Explore With CAL™

Threat Connect’s Collective Analytics Layer (CAL™) is an innovative architecture that distills billions of data points, offering immediate insights into the nature, prevalence, and relevance of a threat. CAL provides global context that leverages anonymously shared insights from ThreatConnect users, open-source intelligence, malware intelligence, and numerous other collections.

When conducting research and investigation into a particular threat, this new capability lets analysts pivot directly within the CAL™ dataset in an intuitive graph-based interface to understand the complex, infrastructure-based relationships and reputation that exist with a particular indicator of compromise (IOC).

Browser Extension

The latest iteration of the ThreatConnect Browser Extension moves beyond providing information about IOCs, enabling users with the capability to scan an online resource for potential threat actor names and their tools. This provides a desirable CAL™ enabled “Rosetta Stone” to match common threat actor aliases as well as insights on the entity regardless of which name is used.

When conducting research and investigation into a particular threat, analysts now have the ability to use multiple sources of threat intelligence to identify relevant pieces of information from any web-based resource. This is a critical capability when it comes to quickly understanding the severity level of the threat and allows one to add it to their threat library for future analysis and investigation efforts.

Workflow Metrics

Workflow metrics amplify the visibility of your security operations, providing important key performance indicators (KPIs) that help measure whether people, tools, and technologies are working together efficiently. 6.4 introduces enhancements to Workflow Metrics, providing deeper insights that show trends for detection and response across a period of time. SOC team leaders can also gain perspective on the distribution of team case assignments as well as how to best prioritize unassigned cases.

The addition of a dashboard visualization showing Mean Time to Detection (MTTD) and Mean Time to Respond (MTTR) over variable periods of time can help SOC leaders evaluate detection and response trends. New, simple to configure dashboard cards for active and unassigned cases lets team leads make more informed decisions when managing the workload of the team.

ThreatConnect’s risk-led, intelligence-driven approach reduces complexity, integrating processes and technologies to continually strengthen defenses, drive down risk, and revolutionize the way customers protect their organizations by turning intelligence into action.

Top iTechnology IT and DevOps News: Vertical Relevance Achieves AWS DevOps Competency Status

[To share your insights with us, please write to sghosh@martechseries.com]

Related posts

Mouser Celebrates 1 Million Customer Downloads of ECAD Models

CIO Influence News Desk

Logz.io Launches App 360, Revolutionizing Application Performance Monitoring

Cision PRWeb

The Purple Guys Continues Strategic Expansion with Acquisition of Technology Pointe

CIO Influence News Desk

Leave a Comment