Advanced Cyber Threat (ACT)®
An intelligence service that synchronizes critical data feeds from vendors and communities of threat intelligence, including open source, normalizes and delivers threat intelligence to RuleGATE.
Gateway devices deploy at the enterprise network perimeter and alert/block using cyber security policies based on threat intelligence. RuleGATE can handle the volume of ALL of the relevant sources of threat intelligence.
QuickTHREAT Analytics Manager®
Visualizes a host of threat intelligence based activity and provides instantaneous internal host-correlation, simplifying the process for identifying compromised systems in even the largest of organizations.
Threat intelligence in its most basic form, is Indicators of Compromise (IoCs), such as an IP address associated with command and control infrastructure, malicious phishing domain names, or URL paths to download malware.
Reporting and context informs and relates this information in a meaningful way. Who is behind this attack? What are they looking for? Why are they coming after me? Threat intelligence provides relevant context to organizations to prioritize and defend against the changing threat landscape.
Typical network deployments usually take only a single day to install, configure, and analyze network traffic. QuickThreat Gateways are most effective when installed at each Internet facing link, outside the firewall security stack. Due to the performance of QuickThreat Gateways, often 1 or 2 devices can support an entire datacenter or corporate headquarters. Additional deployment use cases are available; please contact us for more information.