The Five Elements of Threat2Alert
The Nettitude SOC combines this with many other sources of data to provide a rich base source of information. Intelligence is derived to ensure the actions and events you are provided with are real and credible.
The data is created from your business intelligence needs and the areas of impact for your organisation are highlighted. Data that is not relevant is removed.
Nettitude’s SOC Personnel
The SOC is made up of the following key personnel and expertise:
Cyber Threat Intelligence
Our system ingests data from a variety of sources, confirms through active analysis if the data is valid and gathers context around the data. Our global honeypot network has over 200 nodes and is growing all the time collecting data on breaches, malware samples, malicious users, servers and payloads. Our in house tools mine this data for IoCs and patterns that can be used on the hunt within your networks.
All of this gives a powerful set of information that can be used in context of your business, to give true intelligence to the actions and guidance being provided. We can provide information from commercial sources and operational threat intelligence as well as well-known in-house and open source feeds.
This gives you the confidence that any value being derived from this data warehouse will be incorporated into the service Nettitude provides for your business.
How does the service work?
1: Our big data platforms to gather intelligence relevant to your business
2: Commercial OSINT and TECHINT intelligence feeds
3: Open Source TECHINT intelligence feeds
4: Proprietary honeypot collectors harvest real time TECHINT intelligence
5: Intelligence is normalised, weighted and integrated in to the Threat2Alert SIEM services