Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
com
Group−IB
THREAT
INTELLIGENCE
Attack attribution based
on Threat Intelligence data.
Threat Intelligence
Threat Intelligence
Key differences:
1 Attacker
management in lieu
2 Protection against
attackers rather than
3 In-depth research
into attackers instead
4 The most relevant
data with up-to-date
of indicator irrelevant or general of raw data analysis. context.
management. threats.
Threat Intelligence
How Threat Intelligence Works
1 Detection 2 Ranking
• Your security systems continuously detect threats. • Attackers are ranked according
to their relevance.
• Threat Intelligence exposes what is overlooked
by current solutions. • Threat hunting for new data is built
around these attackers.
• All detected threats undergo attribution.
• Data on attackers is converted
into their TTPs for future checks.
3 Attribution
and enrichment
• Raw data from web servers and malware is fed
4 Testing
into the system. • New and relevant techniques are used
for testing security systems.
• Attacks are matched to known threats through
correlation between raw data and Threat Intelligence. • Testing is carried out by either a local
team or Group-IB’s Red Team.
• Tools for analyzing malware and searching for hidden links
make it possible to attribute yet unknown threats.
Key advantages
Integration with built-in
Built-in attribution tool security solutions with STIX / In-depth analysis of attackers
TAXII, API/JSON support
Group-IB is ranked among the best threat intelligence vendors in the world by Gartner,
IDC, Forrester, Cyber Defense Magazine, and SC Media.
group-ib.com
group-ib.com
Learn more
Intelligence–Driven Services
about Threat Intelligence
group-ib.com
Strengthen your cybersecurity posture with services
and advice from experienced specialists with ‘boots
on the ground’ and access to one of the most advanced
threat intelligence gathering infrastructures in the world.
Contact us to test
Threat Intelligence
info@group-ib.com
Security & Risk Threat Hunting
Assessment & Response