Published: 10 December 2014
Summary
This research describes for CISOs and IT security leaders how threat intelligence platforms allow security organizations to ingest structured and unstructured threat intelligence so they can visualize, correlate and gain context; securely share TI that is machine-readable; and act on it.
Included in Full Research
- Technology Description
- Collect
- Correlate
- Categorize
- Integrate
- Action
- Share
- Standards
- Operating Requirements
- Uses
- The TIP Will Drive the Third Wave of MRTI Usage in Organizations
- Making Existing Technology Smarter
- Making Better Use of Scarce Resources
- Benefits and Risks
- Technology Alternatives
- Selection Guidelines
- Price Performance
- Technology Providers