top of page
External Attack Surface Management - Continuous Monitoring for Cyber Attacks

Threat Feeds

Fortify your defenses in real time.

Automate your defenses and outmaneuver threats

Integrate.Automate.Defend.
Optimize your defenses 

What are Threat Feeds?

Three distinct Threat Feeds have been designed for Network Security Teams, Threat Researchers, Threat Hunters, and Malware Analysts to empower them to scale and accelerate.

How it works

Three distinct feeds to suit specific needs

Botnet Analysis & Reporting (BARS)

Controllers

IP Reputation

 

Data Delivery

Provide seamless integration into various services and platforms using structured XML format, generated hourly with 24hr lookback of all observations/events

Use Cases

Make perimeter defense more robust

Optimize application-level firewalling and gateway security rule bases.

 

Limit your exposure to threats

Block compromised nodes from calling out, block malicious attachments coming in.

Internal Monitoring and Detection

De-prioritization of low-criticality alerts (e.g. scanners)

Hourly Updates

Hourly Updates: Stay ahead with threat data that's updated every hour.

Botnet Analysis &
Reporting (BARS)

For malware analysts, researchers and threat hunters.

  • Deep insights into botnets, hourly updates with bot-centric context, tracking malware families, and DDoS commands.

Controllers
 

For network security teams

  • Track and identify key malware threats. Provides insights into malicious software behaviors and patterns, including new and unnamed malware families

IP Reputation
 

For network and gateway security teams

  • Hourly updated IP reputation feed with comprehensive coverage from botnets to honeypots, darknets, and proxies.

bottom of page