Threat Intelligence
This brochure outlines how Huntsman Threat Intelligence sources cyber security intelligence and event context automatically, and in real-time from:
- External sources
A public or commercial list of compromised websites or botnet members
- Community-based sources
Such as a CERT service or an industry body
- Localised and specific sources
Based on either known risk factors; sensitive systems, users or networks; or specific actionable intelligence sources
- Contextual sources
Such as ongoing investigations or other systems.
Download the free brochure