Buyer's Guide

Evaluate Weigh the pros and cons of technologies, products and projects you are considering.

Security threat intelligence services: A buyer's guide

In this SearchSecurity buyer's guide, learn why it's important to employ threat intelligence services, as well as how to evaluate and subscribe to the right service and feed for your organization.

Introduction

A security threat intelligence service collects, analyzes and filters data about emerging threats to produce actionable information for organizations in the form of management reports and data feeds for automated security control systems. Its main purpose is to assist in the understanding of the risks of (and better protect against) today's ever-evolving security threats.

These include threats such as advanced persistent threats (APTs), exploits and zero-day vulnerabilities, as well as traditional malware (viruses, worms, Trojan horses, rootkits, etc.), botnets and much more. Privilege escalation, spear-phishing and hacktivism are on the rise as well.

That's why it is so important that organizations know what threats exist and how they could affect their IT infrastructures -- particularly if intellectual property and confidential information could be at risk of being exposed or its financial well-being and reputation endangered. Since the threat intelligence services market is relatively new, however, it's often a challenge to compare service details side by side to get an accurate picture of which offers what features and which threat intelligence feed is the right one for a particular organization.

In this buyer's guide, readers will learn how security threat intelligence works, as well as how and why these services can benefit organizations. It also lays out what you need to know before making an investment in a threat intelligence, presents direct comparisons between the leading threat intelligence services, and provides a series of product overviews of some of the top threat intelligence services on the market today.

1What is...?-

The evolution of the threat intelligence service

Learn how threat intelligence services work to help in the proactive defense of enterprise networks.

Feature

An introduction to threat intelligence platforms in the enterprise

Expert Ed Tittel describes how threat intelligence platforms work to help in the proactive defense of enterprise networks. Continue Reading

2Do I need...?-

The business case for threat intelligence service

Find out which types of organizations need a threat intelligence service as part of a proactive, layered security strategy.

Feature

Enterprise scenarios for threat intelligence tools

Expert contributor Ed Tittel explains which types of organizations need threat intelligence tools as part of a proactive, layered security strategy to protect against threats. Continue Reading

3How to buy...?-

How to procure a threat intelligence service

Explore the key criteria for evaluating threat intelligence feeds to determine the best type of service for your enterprise's needs.

Feature

Five criteria for purchasing from threat intelligence providers

Expert Ed Tittel explores key criteria for evaluating threat intelligence providers to determine the best service for an enterprise's needs. Continue Reading

4Which should I buy?-

The top threat intelligence services compared

What makes a particular threat intelligence service right for an enterprise? Here we compare offerings from several leading threat intelligence vendors and review the pros and cons of their products to help you decide which might be right for your organization.

Feature

Comparing the top threat intelligence services

Expert Ed Tittel examines the top threat intelligence services to understand how they differ from one another and address various enterprise security needs. Continue Reading

5Threat intelligence overview-

A who's who of the market-leading threat intelligence vendors and services

Threat intelligence takes data from multiple sources and turns it into actionable, contextual information. We take a close look at the top security threat intelligence services on the market today.

Feature

Detailing the features of LookingGlass Cyber Threat Center

Expert Ed Tittel looks at the LookingGlass Cyber Threat Center service for providing organizations with intelligence on today's top IT threats. Continue Reading

Feature

SecureWorks threat intelligence and what it can do for your enterprise

Expert Ed Tittel examines the features and capabilities of SecureWorks, which gathers its intelligence from thousands of SecureWorks global customers. Continue Reading

Feature

FireEye iSIGHT Threat Intelligence: Services overview

Expert Ed Tittel looks at FireEye iSIGHT Threat Intelligence service for providing actionable, contextual data about today's top IT threats to organizations. Continue Reading

Feature

Threat Intelligence service overview of Infoblox ActiveTrust

Expert Ed Tittel looks at the features and capabilities of the Infoblox ActiveTrust threat intelligence service for providing data on the top IT threats to organizations. Continue Reading

Feature

LogRhythm Security Intelligence: Threat intelligence services overview

In this threat intelligence service overview, Expert Ed Tittel looks at the LogRhythm Security Intelligence threat intelligence platform, designed for simple setup and ease of use. Continue Reading

Feature

RSA NetWitness Suite and its threat intelligence capabilities

Expert Ed Tittel examines the RSA NetWitness Suite threat intelligence platform, which offers network forensic and analytics tools for investigating incidents and analyzing data. Continue Reading

Feature

Analyzing the capabilities of Symantec DeepSight Intelligence

Expert Ed Tittel offers an overview of Symantec DeepSight Intelligence, which provides organizations with information and alerts on today's IT threats. Continue Reading

Feature

Reviewing the threat intelligence features of VeriSign iDefense

Expert Ed Tittel looks at VeriSign iDefense threat intelligence service for providing actionable, contextual data about today's top IT threats to organizations. Continue Reading

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close