skip to main content


Threat Intelligence Gateways (TIGs) apply existing intelligence to automate the response to known or mundane threats and reduce the cyberthreat noise.


  • According to Metcalf’s law, connectivity drives up the "effect" of a network, which increases as a square of the number of connections. This applies to risk or threat at least as much as it does to value.

Features and Benefits

  • Describes how a TIG works.
  • Explains that TIGs are complementary to existing defensive tools.

Key questions answered

  • How does a TIG enhance the operation of a firewall?
  • What are the essential elements of a TIG?

Table of contents

Ovum view

  • Summary
  • Threat overload
  • Streamlining the challenge
  • Key aspects of a TIG


  • Further reading
  • Author