|Page (1) of 1 - 05/17/18||email article||print page|
Blueliv boosts its cyberthreat intelligence platform with deep defense tools for richer investigationsThreat Compass pay-as-you-need modular solution now offers threat enrichment capability and Dark Web search (May 17, 2018)
Threat Compass pay-as-you-need modular solution now offers threat enrichment capability and Dark Web search
17 May 2018 ‚?? Barcelona, Spain ‚?? Blueliv, a leading enterprise-class cyberthreat intelligence company, today announces two significant updates to its modular Threat Compass solution. Threat Context, a brand new enrichment module, enables security teams to improve their productivity with contextualized threat indicator information, enhancing incident triage, post-incident forensics and red-teaming activities. Additionally, users of the Dark Web module can now search the darknet as if it were the open Internet, but without the risks associated with navigating the environment.
Enterprise security teams are under significant pressure to detect, respond and react to cyberthreats at pace. But a combination of scarce resource and overcomplicated tools has limited their capacity to manage cyber-risk effectively. The new and enhanced Threat Compass intelligence modules are simplifying and accelerating cybersecurity processes at the enterprise level by providing deep defense from the outside in.
Daniel Sol√≠s, CEO & Founder Blueliv, said, ‚??Cybercriminals are constantly pioneering new techniques and weapons, transforming the threat landscape at dizzying speed. The good guys need to keep pace, and due to a shortage of cybersecurity talent, enterprises are looking for tools to maximize their limited resource. Innovations like Threat Context and Dark Web search not only deliver easily-managed, relevant intelligence but can accelerate decision making too, increasing productivity throughout the team.‚??
Designed with organizations with a mature security posture in mind, Threat Context provides SOC, Incident Response and Threat Intelligence teams with continuously updated and intuitive information around threat actors, campaigns, IOCs, attack patterns, tools, signatures and CVEs. Using Blueliv‚??s ever-expanding database of over 65 million items, the easy-to-use module offers graphical interrelationships and pivoting capabilities similar to Wikipedia, so analysts can rapidly gather enriched, contextualized information to enhance cybersecurity processes before, during and after an attack.
- Before an attack: facilitates analysis of actors and campaigns affecting your organization or sector; provides factual information so red teams can execute highly realistic attack simulations
- During an attack: speeds up triage processes and incident response; provides qualified information help orchestration systems prioritize relevant IOCs
- After an attack: provides required detail for forensics, investigations and reporting
Related Keywords:Blueliv, cyberthreat