Published: 19 February 2019
Summary
Threat intelligence capabilities can make your digital businesses more resilient. Security and risk management leaders will need to evaluate the capabilities and features of TI offerings and match them to the needs of their security programs.
Included in Full Research
- Machine-Readable Content
- Human-Focused Content
- The Use of TI Services Is Broadening
- TI Is Pervasive in Security Products and Services
- Open Standards Are Now Viable; Demand Support for Them in Your Products and Use Them in Your Processes
- APIs Continue to Evolve and Support Better Integration Options
- End Users Are Creating Sharing Capabilities for TI
- Pricing Models Are Starting to Standardize
- TI Is Integrated With Adjacent Capabilities
- Vendors Are Still Looking to Tailor Offerings to a Broader List of Vertical Industries and Organizational Sizes
- Vendors Often Consume Similar Information
- Vendor Capabilities Vary
- Popular TI Use Cases
- Security Technology Telemetry Enrichment
- Phishing Detection
- Vulnerability Prioritization
- Social Media Monitoring
- Surface, “Deep” and “Dark” Web Monitoring
- Brand Monitoring
- TI Investigations and Response
- Fraud Detection
- TI Analyst Augmentation
- TI Sharing
- Threat Actor Tracking
- Intelligence Analyst Investigations Tools
- Rogue or Fake Mobile App Detection
- Market Introduction
- Acquire
- Commercial TI Services
- Free TI Sources
- CERTs
- ISACs and Others
- Aggregate Multiple Sources of TI
- Action
- Acquire
- Breadth of Coverage
- Depth and Accuracy
- Ability to Execute
- Extensibility
- Specialization
- Aggregate
- Action