CIO Influence
CIO Influence News Machine Learning Security

ThreatConnect Acquires Polarity to Bring Intelligence to the Point of Decision for Security Teams

ThreatConnect Acquires Polarity to Bring Intelligence to the Point of Decision for Security Teams

Combination Gives SOC Analysts, Incident Responders, Threat Hunters, and Cyber Threat Intelligence Teams Contextualized and Correlated Intel When and Where They Need it to Improve Detection and Response

ThreatConnect, maker of leading Threat Intelligence Operations (TI Ops) and Cyber Risk Quantification (CRQ) solutions, announced today that it has acquired Polarity.

Polarity streamlines security analyst workflow, allowing them to dramatically improve the efficiency of their threat detection and response efforts without switching context or leaving their pane of glass by bringing contextual data from more than 200 sources of security alerts, logs, threat intelligence indicators, and incidents.

Latest CIO Influence Article: Leveraging Big Data Analytics for Strategic Decision-Making: A Guide for CIOs

With this acquisition, ThreatConnect furthers its vision to “change the way security works by turning intelligence into insights and actions.” Using a combination of machine vision, optical character recognition (OCR), federated search, correlation, and contextualization, Polarity enables threat intelligence consumers, including SOC, incident response, threat hunting, and vulnerability management teams, to gain frictionless access to all sources of context and knowledge regardless of where it’s produced or stored. It eliminates the need for security professionals to learn multiple query languages, cuts the need for context switching across dozens of browser tabs and apps, and surfaces in-line insights wherever analysts work. This allows more efficient and effective threat analysis and response, including gaining insights using GenAI LLMs, taking automated actions with SOAR tools, and memorializing new threat intel.

“Our customers need a friction-free way to bring high-fidelity intelligence to the teams that are fighting a daily battle against adversaries,” said Balaji Yelamanchili, CEO of ThreatConnect. “Combining our Threat Intelligence Operations Platform with Polarity’s ability to present relevant data wherever analysts are working speeds actions and decision-making, which gives them a new advantage in this fight.”

“Using Polarity with the ThreatConnect Platform is a force multiplier for our security team,” said Michael Francess, Senior Manager of Cybersecurity Advanced Threat at Wyndham Hotels and Resorts. “Together, these solutions give us confidence that our most valuable information is delivered to our analysts, cross-referenced against multiple sources, and acted upon by the right people at the right time.”

Also Read: Security as a Business Enabler: How Collaboration Between IT and Business Teams Strengthens Data Protection

For Polarity customers, the combination with ThreatConnect means they can access unique threat data feeds and insights from ThreatConnect’s AI-powered analytic engine and the ThreatConnect user community. This will add greater context and fidelity for threat data surfaced within the Polarity, providing analysts and operators with the best possible data to make decisions. Customers using both products will soon be able to drive security orchestration and automation actions to their security controls from Polarity using ThreatConnect’s existing robust security automation capabilities.

“The fusion of our products, technologies, and teams extends the value of intelligence beyond static workflows to everywhere decisions are being made,” said Paul Battista, CEO of Polarity. With our latest developments in AI and automation, together, we can empower security professionals with timely, actionable intelligence at every juncture of their workflow. We’re looking forward to introducing Polarity to ThreatConnect customers and bringing significant innovations to the market.”

Latest CIO Influence Article: CIO’s Guide to Preventing Ransomware Attacks in B2B Enterprises

[To share your insights with us as part of editorial or sponsored content, please write to psen@itechseries.com]

Related posts

German Enterprises Inch Toward S/4HANA, Cloud Migrations as SAP, Service Providers Roll Out Support Programs

Globe Collaborates with Red Hat Open Innovation Labs to Modernize IT Infrastructure for Greater Agility and Scalability

GlobeNewswire

Atos Launches Major New Release of Evidian Cloud-Based Identity-As-A-Service Offering

CIO Influence News Desk