Centripetal’s CleanINTERNET® intelligence-led cyber service lets teams operationalize threat intelligence through its market-leading and patented Threat Intelligence Gateway technology. It’s the most powerful and robust Threat Intelligence Gateway on the market.
70+ out-of-the-box threat intelligence sources (premium, open source, industry-specific)
3000+ unique IOC feeds updated in real-time as feeds update dynamically
Billions of threat indicators correlated and filtered at network edge to millions of complex rules to influence enforcement
Automatic enforcement (block, redirect, shield, mirror, allow, capture) with 160 Gbps backplane to support true enterprise speeds
"The challenge with network security solutions is they are only capable of loading a finite number of machine readable threat intelligence (MRTI) indicators (for example internet protocol [IP] addresses, fully qualified domain names, hostnames and URLs) into memory. However, more than 650 million shared threat indicators are available in open-source feeds alone, excluding commercial proprietary TI, which likely number in the hundreds of millions."
Source: Gartner, Emerging Technology Analysis: Threat Intelligence Gateways.
The enterprise has a major problem. There’s too many breaches. Companies have far too many security incidents. And teams who set out to apply intelligence to defeat advanced threats have the right idea initially. Why?
- Organizations cannot apply threat intelligence at-scale.
- High latency rates limit real-time prevention of known threats. Less than 1% of compromise indicators are persistently applied to an organization’s defense
Without a single platform that can process the amount of threat intelligence necessary to actively defend the business, security teams have been struggling. Firewalls and IPS systems are not the answer.
Centripetal has solved this problem with its invention of the Threat Intelligence Gateway. This solution will fundamentally change how cyber teams filter bad traffic based on intelligence.
This allows organizations to:
- Eradicate threats based threat intelligence enforcement
- Focus on investigating the 10% of threats that are unknown