Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Threat Intelligence

02:00 PM
Dark Reading
Dark Reading
Products and Releases

ThreatConnect Upgrades Threat Intelligence Platform with Release of ThreatConnect 4.0

ARLINGTON, Va. – January 26, 2016 - ThreatConnect®, Inc., today announced ThreatConnect 4.0, the latest version of the industry’s only true threat intelligence platform (TIP). Immediately available for all customers, ThreatConnect 4.0 offers customized reporting catering to Directors and the C-suite, making it easy for these stakeholders to evaluate threat intelligence. Security Directors can easily see the impact threat intelligence is having across their organization and make real-time playbook and workflow decisions to maximize efforts. Plus, chief information security officers (CISO) gain a much-demanded ability to measure the return on investment (ROI) of Threat Intelligence.

"Cyber threats are no longer solely a problem for security teams and analysts, the stakes and prevalence of data breaches affect more organizations’ missions and bottom line, making this a greater area of C-Suite and board-level involvement,” said ThreatConnect CEO Adam Vincent. “While we often refer to our platform as ‘made for analysts, by analysts’, we recognize the need to deliver insights that are easily digestible from the security analyst all the way to the CISO, in one platform, and that’s exactly what we’ve done with ThreatConnect 4.0.”

There are several additional differentiators within ThreatConnect 4.0 including the ability to distinguish the quality, relevance and accuracy (false positives) of intelligence sources being evaluated. In an easily understood visual, ThreatConnect 4.0 is grouped in four sections: sources, indicators, intelligence, and activities. An overview of all assessed data from within the organization, specified communities and threat feeds is provided all on one screen. All sources of indicators are then plotted on a ‘threat rating versus confidence’ quadrant, making it effortless to compare and contrast the greatest areas of concern. These new features enable executives, security teams and analysts to collaborate and make faster, informed decisions on how to invest time and resources, dramatically improving security ROI. 

ThreatConnect 4.0 also boasts a new user interface, with an improved, easy to navigate dashboard and intuitive views of team workflows and collaboration to enhance helping security staffs and managers readily understanding of what is happening and what is important with a simple glance.

ThreatConnect 4.0 includes previous aspects as well, most notably its ability to be both on-premises and in cloud – the only TIP in the market with this capability – to flexibly suit different organizations’ requirements. In addition, ThreatConnect 4.0 continues to offer access to the highly valuable TC Exchange, which allows users to join or create their own communities - accessing open source and premium feeds to enhance intelligence gathering. Also within TC Exchange, users can build, host and share secure, customized applications that enable better contextual intelligence gathering, analysis and sharing.

Read more about ThreatConnect 4.0 at “What’s New in ThreatConnect 4.0.”


About ThreatConnect

ThreatConnect, Inc. is the leading provider of threat intelligence products and services including ThreatConnect®, the most widely adopted Threat Intelligence Platform (TIP) on the market. ThreatConnect delivers a single platform in the cloud and on-premises to effectively aggregate, analyze, and act to counter sophisticated cyber-attacks. Designed to engage security teams at all levels of maturity, ThreatConnect is used globally by organizations just getting their threat intelligence programs started as well as more than 40% of the Fortune 100. Leveraging advanced analytics capabilities ThreatConnect offers a superior understanding of relevant cyber threats to business operations. Learn more about our products and services, visit: www.threatconnect.com.



Recommended Reading:

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 7/13/2020
Omdia Research Launches Page on Dark Reading
Tim Wilson, Editor in Chief, Dark Reading 7/9/2020
Russian Cyber Gang 'Cosmic Lynx' Focuses on Email Fraud
Kelly Sheridan, Staff Editor, Dark Reading,  7/7/2020
Register for Dark Reading Newsletters
White Papers
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-07-13
The docker packages version docker-1.13.1-108.git4ef4b30.el7 as released for Red Hat Enterprise Linux 7 Extras via RHBA-2020:0053 (https://access.redhat.com/errata/RHBA-2020:0053) included an incorrect version of runc that was missing multiple bug and security fixes. One of the fixes regressed in th...
PUBLISHED: 2020-07-13
The version of docker as released for Red Hat Enterprise Linux 7 Extras via RHBA-2020:0053 advisory included an incorrect version of runc missing the fix for CVE-2019-5736, which was previously fixed via RHSA-2019:0304. This issue could allow a malicious or compromised container to compromise the co...
PUBLISHED: 2020-07-13
An issue was discovered in the Video Extension in Suprema BioStar 2 before 2.8.2. Remote attackers can read arbitrary files from the server via Directory Traversal.
PUBLISHED: 2020-07-13
The goform/setUsbUnload endpoint of Tenda AC15 AC1900 version allows remote attackers to execute arbitrary system commands via the deviceName POST parameter.
PUBLISHED: 2020-07-13
A hard-coded telnet credential in the tenda_login binary of Tenda AC15 AC1900 version allows unauthenticated remote attackers to start a telnetd service on the device.