Cyber threat intelligence aims to create and share knowledge about the current state of the rapidly evolving cyber threat landscape and provide users and cybersecurity solutions with the information and context required to identify current threats and make strategic decisions for the future.
Cyber Threat Intelligence is the gathering and analysis of multi-source cybersecurity data using advanced analytic algorithms. By collecting large amounts of data about current cybersecurity threats and trends and performing analytics on this data, threat intelligence providers can derive usable data and insights that help their customers to better detect and prepare for cyber threats.
Organizations have a wide range of intelligence needs, ranging from low-level information on the malware variants currently being used in attack campaigns to high-level information intended to inform strategic investments and policy creation. For this reason, threat intelligence can be classified into one of three different types:
Cyber Threat intelligence is designed and intended to improve an organization’s ability to minimize cyber risk, manage cyber threats and feedback intelligence into all products that protect any of the attack surfaces. In order to effectively support an organization’s cybersecurity strategy, a threat intelligence platform should provide certain functionality:
A number of different threat intelligence platforms and feeds exist, and, with threat intelligence, more is not always better. Subscribing to multiple threat intelligence feeds and attempting to aggregate and analyze them in-house can result in a deluge of redundant and low-quality data. Instead, an organization should select a threat intelligence platform with the following qualities:
Check Point‘s ThreatCloud AI acts as a single source of intelligence data that is accessible to users via a variety of different channels. The live Threat Map offers a high-level view of the current state of cyberattacks, while Check Point’s weekly Threat Intelligence Bulletins provide deeper insights into current attack trends. ThreatCloud AI is also integrated into Check Point’s Infinity SOC to provide support for threat detection and response and threat hunting activities.
Check Point’s cyber threat intelligence offerings are continuously updated and improved by Check Point’s threat intelligence research team. The intelligence produced by Check Point Research is automatically disseminated to its products, enabling them to identify and protect against the latest cyber threats.
Check Point provides access to high-quality strategic, operational, and tactical threat intelligence. To learn more about Check Point’s threat intelligence offerings, check out our threat intelligence research page.