Threat information needs to be normalized, corroborated, aggregated, and refined to produce threat intelligence that can be readily analyzed and acted on. This is what TIPs are designed to do and why they have come into being.
- This is a vital addition to the security capabilities, providing a consistent model for gathering and understanding threat intelligence, being able to share it in a way that can be of use both externally and internally, and taking action to mitigate risks.
Features and Benefits
- Explains the functions and features of a TIP.
- Describes the main players in the market and compares them.
Key questions answered
- What are the basic components of a TIP?
- How do the main TIPs in the market compare and differ?
Table of contents
Recommendations for enterprises
Recommendations for vendors
Defining and exploring threat intelligence platforms
Definition and characteristics
Business value and applications
Market landscape and participants
Market origin and dynamics
Future market development
Vendors on the Ovum Market Radar: Threat Intelligence Platforms
On the Radar: Anomali
On the Radar: EclecticIQ
On the Radar: ThreatConnect
On the Radar: ThreatQuotient