+
+

Related Products

  • Criminal IP
    17 Ratings
    Visit Website
  • SOCRadar Extended Threat Intelligence
    101 Ratings
    Visit Website
  • A10 Defend Threat Control
    41 Ratings
    Visit Website
  • ManageEngine EventLog Analyzer
    203 Ratings
    Visit Website
  • ManageEngine Log360
    157 Ratings
    Visit Website
  • ESET PROTECT Advanced
    2,249 Ratings
    Visit Website
  • ThreatLocker
    502 Ratings
    Visit Website
  • Safetica
    409 Ratings
    Visit Website
  • Criminal IP ASM
    18 Ratings
    Visit Website
  • Omnilert
    26 Ratings
    Visit Website

About

Adaptive Threat Intelligence helps security specialists quickly neutralize threats before they attack. Leveraging our global network visibility, we provide high-fidelity intelligence correlated to your IP addresses, combined with Rapid Threat Defense to proactively stop threats and simplify security. Automated validation technology developed and deployed by Black Lotus Labs tests newly discovered threats and validates the fidelity of our threat data, minimizing false positives. Rapid threat defense automated detection and response capabilities block threats based on your risk tolerance. Comprehensive virtual offering eliminates the need to deploy or integrate devices and data, and provides a single escalation point. Easy-to-use security portal, mobile app, API feed and customizable alerts that allow you to manage threat visualization and response with context-rich reports and historical views.

About

ThreatBook CTI provides high-fidelity intelligence collected from alerts from real customer cases. Our R&D team uses it as a critical indicator to evaluate our intelligence extraction and quality control work. Meanwhile, we continuously assess the data based on any relevant alerts from timely cyber incidents. ThreatBook CTI aggregates data and information with a clear verdict, behavior conclusions, and intruder portraits. It enables the SOC team to spend less time on irrelevant or harmless activities,boosting the operation's efficiency. The core value of threat intelligence is detection and response, that is, enterprises can carry out compromise detection with high-fidelity intelligence, figuring out if a device has been attacked or if a server has been infected and respond based on the investigation to prevent threats, isolate or avoid risks in a timely manner and reduce the likelihood of serious consequences.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Security specialists that want help with neutralizing threats before they attack

Audience

IT teams wanting a tool to improve cyber threat detection and response

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

Lumen Technologies
Founded: 1968
United States
www.lumen.com/en-us/security/adaptive-threat-intelligence.html

Company Information

ThreatBook
Founded: 2015
China
threatbook.io

Alternatives

Alternatives

CleanINTERNET

CleanINTERNET

Centripetal
ThreatStream

ThreatStream

Anomali
Cavalier

Cavalier

Hudson Rock
Rapid7 MDR

Rapid7 MDR

Rapid7
CleanINTERNET

CleanINTERNET

Centripetal

Categories

Categories

Integrations

No info available.

Integrations

No info available.
Claim Lumen Adaptive Threat Intelligence and update features and information
Claim Lumen Adaptive Threat Intelligence and update features and information
Claim ThreatBook and update features and information
Claim ThreatBook and update features and information