Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Threat Intelligence

02:00 PM
Dark Reading
Dark Reading
Products and Releases

ThreatConnect Upgrades Threat Intelligence Platform with Release of ThreatConnect 4.0

ARLINGTON, Va. – January 26, 2016 - ThreatConnect®, Inc., today announced ThreatConnect 4.0, the latest version of the industry’s only true threat intelligence platform (TIP). Immediately available for all customers, ThreatConnect 4.0 offers customized reporting catering to Directors and the C-suite, making it easy for these stakeholders to evaluate threat intelligence. Security Directors can easily see the impact threat intelligence is having across their organization and make real-time playbook and workflow decisions to maximize efforts. Plus, chief information security officers (CISO) gain a much-demanded ability to measure the return on investment (ROI) of Threat Intelligence.

"Cyber threats are no longer solely a problem for security teams and analysts, the stakes and prevalence of data breaches affect more organizations’ missions and bottom line, making this a greater area of C-Suite and board-level involvement,” said ThreatConnect CEO Adam Vincent. “While we often refer to our platform as ‘made for analysts, by analysts’, we recognize the need to deliver insights that are easily digestible from the security analyst all the way to the CISO, in one platform, and that’s exactly what we’ve done with ThreatConnect 4.0.”

There are several additional differentiators within ThreatConnect 4.0 including the ability to distinguish the quality, relevance and accuracy (false positives) of intelligence sources being evaluated. In an easily understood visual, ThreatConnect 4.0 is grouped in four sections: sources, indicators, intelligence, and activities. An overview of all assessed data from within the organization, specified communities and threat feeds is provided all on one screen. All sources of indicators are then plotted on a ‘threat rating versus confidence’ quadrant, making it effortless to compare and contrast the greatest areas of concern. These new features enable executives, security teams and analysts to collaborate and make faster, informed decisions on how to invest time and resources, dramatically improving security ROI. 

ThreatConnect 4.0 also boasts a new user interface, with an improved, easy to navigate dashboard and intuitive views of team workflows and collaboration to enhance helping security staffs and managers readily understanding of what is happening and what is important with a simple glance.

ThreatConnect 4.0 includes previous aspects as well, most notably its ability to be both on-premises and in cloud – the only TIP in the market with this capability – to flexibly suit different organizations’ requirements. In addition, ThreatConnect 4.0 continues to offer access to the highly valuable TC Exchange, which allows users to join or create their own communities - accessing open source and premium feeds to enhance intelligence gathering. Also within TC Exchange, users can build, host and share secure, customized applications that enable better contextual intelligence gathering, analysis and sharing.

Read more about ThreatConnect 4.0 at “What’s New in ThreatConnect 4.0.”


About ThreatConnect

ThreatConnect, Inc. is the leading provider of threat intelligence products and services including ThreatConnect®, the most widely adopted Threat Intelligence Platform (TIP) on the market. ThreatConnect delivers a single platform in the cloud and on-premises to effectively aggregate, analyze, and act to counter sophisticated cyber-attacks. Designed to engage security teams at all levels of maturity, ThreatConnect is used globally by organizations just getting their threat intelligence programs started as well as more than 40% of the Fortune 100. Leveraging advanced analytics capabilities ThreatConnect offers a superior understanding of relevant cyber threats to business operations. Learn more about our products and services, visit: www.threatconnect.com.


Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
DevSecOps: The Answer to the Cloud Security Skills Gap
Lamont Orange, Chief Information Security Officer at Netskope,  11/15/2019
Attackers' Costs Increasing as Businesses Focus on Security
Robert Lemos, Contributing Writer,  11/15/2019
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Current Issue
Navigating the Deluge of Security Data
In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2019-11-21
ext4_empty_dir in fs/ext4/namei.c in the Linux kernel through 5.3.12 allows a NULL pointer dereference because ext4_read_dirblock(inode,0,DIRENT_HTREE) can be zero.
PUBLISHED: 2019-11-21
btrfs_root_node in fs/btrfs/ctree.c in the Linux kernel through 5.3.12 allows a NULL pointer dereference because rcu_dereference(root->node) can be zero.
PUBLISHED: 2019-11-21
__btrfs_free_extent in fs/btrfs/extent-tree.c in the Linux kernel through 5.3.12 calls btrfs_print_leaf in a certain ENOENT case, which allows local users to obtain potentially sensitive information about register values via the dmesg program.
PUBLISHED: 2019-11-20
A CWE-200: Information Exposure vulnerability exists in Modicon Controllers (M340 CPUs, M340 communication modules, Premium CPUs, Premium communication modules, Quantum CPUs, Quantum communication modules - see security notification for specific versions), which could cause the disclosure of FTP har...
PUBLISHED: 2019-11-20
A CWE-79: Failure to Preserve Web Page Structure vulnerability exists in Andover Continuum (models 9680, 5740 and 5720, bCX4040, bCX9640, 9900, 9940, 9924 and 9702) , which could enable a successful Cross-site Scripting (XSS attack) when using the products web server.