Audience

Cybersecurity teams

About ThreatConnect SOAR

ThreatConnect’s intelligence-driven, Security Orchestration, Automation and Response (SOAR) Platform includes intelligence, automation, analytics, and workflows in a single platform. The platform drives collaboration across threat intelligence, security operations, and incident response teams by providing the ability to put security data in context with intelligence and analytics, establish process consistency with Playbooks, integrate disparate technologies across the stack with workflows work from a centralized system of record, and measure the effectiveness of the organization with cross-platform analytics and customizable dashboards.

Integrations

Ratings/Reviews

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Company Information

ThreatConnect
Founded: 2011
United States
threatconnect.com

Videos and Screen Captures

Other Useful Business Software
MongoDB Atlas runs apps anywhere Icon
MongoDB Atlas runs apps anywhere

Deploy in 115+ regions with the modern database for every enterprise.

MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
Start Free

Product Details

Platforms Supported
Cloud
Training
Documentation

ThreatConnect SOAR Frequently Asked Questions

Q: What kinds of users and organization types does ThreatConnect SOAR work with?
Q: What languages does ThreatConnect SOAR support in their product?
Q: What other applications or services does ThreatConnect SOAR integrate with?
Q: What type of training does ThreatConnect SOAR provide?

ThreatConnect SOAR Product Features

Incident Response

Workflow Management
Workflow Automation
Incident Database
Incident Alerting
Incident Reporting
Incident Logs
Threat Intelligence
Security Orchestration
Automated Remediation
SLA Tracking / Management
Forensic Data Retention
Privacy Breach Reporting
Compliance Reporting
SIEM Data Ingestion / Correlation
Timeline Analysis
Attack Behavior Analytics