<img alt="" src="https://secure.hiss3lark.com/173130.png" style="display:none;">

 

Blog

Read or download all Datashield news, reviews, content, and more.

 

Recorded Future

A universal threat intelligence solution Recorded Future's threat intelligence platform allows teams to reduce research time, respond confidently, and understand relevant risks. Their product works by analyzing technical, open web, and dark web threat sources, visualizing them for teams and integrating with products like SIEM, SOAR, and GRC.

  • 3 min read
  • March 2, 2020 10:09:05 AM MST

Digital Shadows

Taking threat intelligence to the next level Digital Shadows’ SearchLight threat intelligence platform offers a wide variety of data sources, contextualization of alerts, playbooks, and integrations for turnkey automated remediation.

  • 4 min read
  • February 28, 2020 2:38:24 AM MST

Anomali

A threat intelligence platform utilizing machine learning and optimized threat intelligence Anomali provides a variety of products and services that work in tandem to provide threat intelligence, detect threats, automate normalization of data, visualize IOCs, and facilitate collaboration.

  • 5 min read
  • February 28, 2020 12:26:22 AM MST

    Related Posts

    Bishop Fox

    Meet the leader in Offensive Security Bishop Fox is the largest private offensive security firm. Since 2005, the company has provided security consulting services to the world's leading organizations, working with Fortune 100 companies, to help secure their products, applications, networks, and cloud resources with penetration testing and security assessments.

    • 4 min read
    • March 19, 2021 2:13:14 PM MST

    ExtraHop

    ExtraHop leverages the cloud and provides enterprises with the ability to handle threat detection and mitigation tasks across hybrid infrastructure. Unlike traditional Security Information and Event Management (SIEM) solutions, ExtraHop applies a different approach to threat detection. The method is known as Network Detection and Response (NDR). The NDR approach involves the application of network traffic analysis to investigate anomalous behaviors and risk activities from layer two through layer seven.

    • 4 min read
    • August 7, 2020 12:59:49 PM MST

    Check Point: Next-Generation Firewall

    The fifth generation of cyber-attacks consists of large-scale multi-vector attacks aimed at crippling multiple components of an enterprise’s IT infrastructure. Dealing with these attacks requires a comprehensive solution that protects each gateway, device, and component within an IT architecture.

    • 5 min read
    • June 3, 2020 2:38:10 PM MST