Huntsman Threat Intelligence
This brochure outlines how Huntsman Threat Intelligence sources cyber security intelligence and event context automatically, and in real time from:
- External sources
A public or commercial list of compromised websites or botnet members
- Community-based sources
Such as a CERT service or an industry body
- Localised and specific sources
Based on either known risk factors; sensitive systems, users or networks; or specific actionable intelligence sources
- Contextual sources
Such as ongoing investigations or other systems.
This delivers unparalleled real-time clarity about threats, their severity and likely impact – and significantly improves the quality of security decision-making.