ThreatQuotient has incorporated Bitdefender’s Advanced Threat Intelligence functionality in its ThreatQ platform.
The alliance between the two companies means enterprise customers, managed security services providers (MSSP) and security operations centre (SOC) customers using ThreatQuotient will have greater visibility to accurately detect threats.
“The proprietary real time threat intelligence provided by Bitdefender, strengthens our clients’ ability to accurately detect, assess and validate emerging threats so they can take faster actions to eliminate them from environments,” said Jonathan Couch, senior vice president, strategy at ThreatQuotient.
“ThreatQ customers will have contextualised insights on advanced persistent threats (APTs), malicious email campaigns and other dangers under one centralised view to quickly assess, validate and respond. Our collaboration has proved invaluable to our customers by increasing visibility into malicious campaigns as threat frequency and sophistication continues to rise,” he added.
ThreatQuotient will integrate threat intelligence from Bitdefender’s threat intelligence feeds, including file hashes, IP addresses and domains associated with advanced persistent threats (APTs); domains associated with malware; IP addresses with attacker command and control (C&C) servers; and phishing campaigns.
According to Bitdefender, security teams using the ThreatQ platform incorporate these feeds based on their threat detection needs, enabling them to leverage easy to use and configure integration.
Bitdefender threat intelligence is compiled by its Global Protective Network (GPN), a global network of hundreds of million sensors that collect endpoint threat data.
“Our collaboration with ThreatQuotient helps organisations become more cyber resilient as methods for evading detection become increasingly advanced,” said Andrei Florescu, vice president of product management, Bitdefender Business Solutions Group.
“Threat intelligence platforms like ThreatQ greatly improves detection capabilities and situational awareness across the entire operation while prioritising SOC activities based on threat risk and potential impact.”