Threat Intelligence Gateways (TIGs) apply existing intelligence to automate the response to known or mundane threats and reduce the cyberthreat noise.
- According to Metcalf’s law, connectivity drives up the "effect" of a network, which increases as a square of the number of connections. This applies to risk or threat at least as much as it does to value.
Features and Benefits
- Describes how a TIG works.
- Explains that TIGs are complementary to existing defensive tools.
Key questions answered
- How does a TIG enhance the operation of a firewall?
- What are the essential elements of a TIG?
Table of contents
Streamlining the challenge
Key aspects of a TIG