Threat Sharing

The Threat Sharing platform is an early warning system deployed across a network providing inbox level incident responding, investigation, and response giving users maximum agility and reducing response time. Threat Sharing allows users to expand their threat intelligence reach by leveraging their collective network knowledge, reduce costs, and accelerate implementation. With Threat Sharing in place, users will no longer need to directly experience a malicious attack to initiate inbox investigations delivering faster response times and proactive protection.

Intelligence Triggering Response

After finding any instances of an attack, Threat Sharing automatically shares this intelligence to the rest of the community triggering incident response or investigation throughout the network.

Peer to Peer Data Sharing

Within the community, it is possible to create a trust and reputation-based relationship with any other organization on a decentralized, peer-to-peer basis using our APIs.

Secure Data Sharing

Rules, Workflows and Playbooks are defined on a case by case basis to control how the intelligence from the partner organisation are actioned. High trust relationships can be automated, connections with lower trust scores can require independent verification of the threat analysis before taking action.

 

Various Intelligence Sources

Threat Sharing APIs has the ability for any member of the network to share threat intelligence obtained via their other cybersecurity products and services.

 

Technology Sharing

Using the same peer-to-peer architecture described previously, one organisation using a certain sandbox product can share threat analysis data with another organisation who may be using a different sandbox technology.

Integrated Licensing

Threat Sharing platform helps businesses to utilize the integrated email services owned by other members and get benefit from the analysis capabilities and experiences of other members.