BACKGROUND IMAGE: iSTOCK/GETTY IMAGES

Security threat intelligence services: A buyer's guide

Last updated:August 2015

Editor's note

A security threat intelligence service collects, analyzes and filters data about emerging threats to produce actionable information for organizations in the form of management reports and data feeds for automated security control systems. Its main purpose is to assist in the understanding of the risks of (and better protect against) today's ever-evolving security threats.

These include threats such as advanced persistent threats (APTs), exploits and zero-day vulnerabilities, as well as traditional malware (viruses, worms, Trojan horses, rootkits, etc.), botnets and much more. Privilege escalation, spear-phishing and hacktivism are on the rise as well.

That's why it is so important that organizations know what threats exist and how they could affect their IT infrastructures -- particularly if intellectual property and confidential information could be at risk of being exposed or its financial well-being and reputation endangered. Since the threat intelligence services market is relatively new, however, it's often a challenge to compare service details side by side to get an accurate picture of which offers what features and which threat intelligence feed is the right one for a particular organization.

In this buyer's guide, readers will learn how security threat intelligence works, as well as how and why these services can benefit organizations. It also lays out what you need to know before making an investment in a threat intelligence, presents direct comparisons between the leading threat intelligence services, and provides a series of product overviews of some of the top threat intelligence services on the market today.

1The business case for threat intelligence service

Find out which types of organizations need a threat intelligence service as part of a proactive, layered security strategy.

2How to procure a threat intelligence service

Explore the key criteria for evaluating threat intelligence feeds to determine the best type of service for your enterprise's needs.

3The top threat intelligence services compared

What makes a particular threat intelligence service right for an enterprise? Here we compare offerings from several leading threat intelligence vendors and review the pros and cons of their products to help you decide which might be right for your organization.

4A who's who of the market-leading threat intelligence vendors and services

Threat intelligence takes data from multiple sources and turns it into actionable, contextual information. We take a close look at the top security threat intelligence services on the market today.

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly.com

Close