skip to main content

Introduction

Threat information needs to be normalized, corroborated, aggregated, and refined to produce threat intelligence that can be readily analyzed and acted on. This is what TIPs are designed to do and why they have come into being.

Highlights

  • This is a vital addition to the security capabilities, providing a consistent model for gathering and understanding threat intelligence, being able to share it in a way that can be of use both externally and internally, and taking action to mitigate risks.

Features and Benefits

  • Explains the functions and features of a TIP.
  • Describes the main players in the market and compares them.

Key questions answered

  • What are the basic components of a TIP?
  • How do the main TIPs in the market compare and differ?

Table of contents

Summary

  • Catalyst
  • Ovum view
  • Key messages

Recommendations

  • Recommendations for enterprises
  • Recommendations for vendors

Defining and exploring threat intelligence platforms

  • Definition and characteristics
  • Key capabilities
  • Business value and applications

Market landscape and participants

  • Market origin and dynamics
  • Future market development
  • Vendor landscape

Vendors on the Ovum Market Radar: Threat Intelligence Platforms

  • On the Radar: Anomali
  • On the Radar: EclecticIQ
  • On the Radar: ThreatConnect
  • On the Radar: ThreatQuotient

Appendix

  • On the Radar
  • Authors