Building a Strong CTI Foundation
Learn practical strategies to supercharge your threat intelligence operations.
Watch RecordingTransforming Cyber Intelligence: 4 Essential Tactics for CTI Success
How to build a successful CTI strategy.
Watch RecordingServiceNow and EclecticIQ Intelligence Center
EclecticIQ Intelligence Center and ServiceNow unite to empower SOC teams with instant incident resolution, enriched context, and seamless workflows for faster detection, response, and smarter threat analysis.
Download Solution BriefSANS 2024 Cyber Threat Intelligence Survey
Managing the Evolving Threat Landscape
Download Survey ReportAutomating Asia-Pacific Cyber Threat Intelligence at Scale
How to integrate ThreatVision’s expert APAC intelligence into the EclecticIQ Intelligence Platform and automate it at scale.
Watch RecordingThreat Scout
EclecticIQ Threat Scout is the only browser extension to seamlessly convert online information into comprehensive, structured threat data you can freely embed in your security tools.
Download Product DescriptionGetting More Value out of Your CTI Program
A framework to plan for growth, budget security, and strategic direction
Watch RecordingThe Path to Pre-emptive CTI Operations With EclecticIQ Maturity Model
The model gives organizations a way to assess and measure their capabilities in eight distinct areas essential to supporting operational, tactical, and strategic stakeholders. As organizations progress through the model, they shift their CTI operations from reactive to pre-emptive.
Download White PaperCTI Maturity-driven TIP Buyer’s Guide
The guide provides you with a list of requirements, based on your current and targeted level of CTI maturity, to discuss with your prospective TIP provider.
Download White PaperA Stakeholder-centric Approach to Building a High-performing CTI Practice
How to empower operational, tactical, and strategic stakeholders with cyber threat intelligence.
Download White PaperEclecticIQ Platform and Packages
Discover our unique approach to Intelligence, Automation and Collaboration.
Download Product DescriptionThreat Intelligence Platform For CTI Package
The EclecticIQ TIP for CTI package provides central governments and large enterprises with analyst-centric capabilities to move beyond the limitations of open source or homegrown tools and rudimentary TIPs to execute a state-of-the-art, in-house CTI practice.
Download Product DescriptionThreat Intelligence Platform For SOC Package
The EclecticIQ TIP for SOC package enables enterprises and government agencies to pivot from a reactive, alert-led operation to a proactive, intelligence-led operation. With this pivot, SOC teams overcome the overwhelming flood of alerts and IOCs to focus on adversary tactics, techniques, and procedures (TTPs).
Download Product DescriptionEclecticIQ Intelligence Center
EclecticIQ Intelligence Center is the only threat intelligence solution that unites machine-powered threat data processing and dissemination with human-led data analysis without compromising analyst control, freedom, or flexibility.
Download Product DescriptionEclecticIQ Curated Feeds
With curated and optimized Open Sources and Commercial Sources feeds from EclecticIQ, your CTI team will overcome feed marketplace overload, jumpstart their CTI operations, and expand their threat landscape visibility.
Download Product DescriptionEclecticIQ Basic Training
Familiarize your team with the capabilities of EclecticIQ Intelligence Center.
Download Product DescriptionEclecticIQ Analyst Workflow Training
Train your entire team on EclecticIQ Intelligence Center to jumpstart CTI analysis and threat tracking.
Download Product DescriptionEclecticIQ Admin Training
Train your admins to quickly get EclecticIQ Intelligence Center up and running.
Download Product DescriptionEclecticIQ Threat Intelligence Consultants
Leverage Threat Intelligence Consultants to supercharge your threat intelligence operations and optimize your EclecticIQ Intelligence Center.
Download Product DescriptionMicrosoft Sentinel and EclecticIQ Intelligence Center
Together, EclecticIQ Intelligence Center and Microsoft Sentinel facilitate SOC and CTI teams gaining actionable insights, sharper threat pattern visualizations, and instant situational awareness.
Download Solution BriefFlashpoint and EclecticIQ Intelligence Center
EclecticIQ Intelligence Center now integrates Flashpoint’s trusted actionable intelligence to provide CTI and SOC analysts with the insights they need to make better decisions, respond sooner, and move faster.
Download Solution BriefGroup-IB and EclecticIQ Intelligence Center
As the analyst-centric TIP, EclecticIQ Intelligence Center now provides unparalleled visibility and insights into the threat landscape by integrating the widest range of Group-IB Intelligence data. This data comes from closed sources, real-life investigations, joint ops with law enforcement, and a global technology grid to dive deep into tactics, techniques, and procedures (TTPs).
Download Solution BriefIBM Security QRadar and EclecticIQ Intelligence Center
Make your CTI analyst the SOC/IR team’s hero with the QRadar SIEM and SOAR Apps for EclecticIQ Intelligence Center. With these Apps, you will better prioritize threat analysis and incident response to drive down your time to detect and respond.
Download Solution BriefIntel 471 and EclecticIQ Intelligence Center
EclecticIQ and Intel 471’s combined solution helps organizations dig deep to detect and prevent cyber underground threats. Threat intelligence teams can master their threat landscape by integrating Intel 471’s cybercrime intelligence with EclecticIQ Intelligence Center.
Download Solution BriefKaspersky Intelligence and EclecticIQ Intelligence Center
With EclecticIQ and Kaspersky, organizations can shift their operations to proactive threat management by speeding up CTI operations as analysts identify the most critical threats faster, take timely action sooner and advise the organization on how to respond better.
Download Solution BriefMISP and EclecticIQ Intelligence Center
By integrating MISP (Malware Information Sharing Platform) into EclecticIQ Intelligence Center, not only do you benefit from MISP’s strong sharing capabilities and extensive community connections, but you also leverage the analyst-centric functionality from EclecticIQ Intelligence Center.
Download Solution BriefPalo Alto Networks Cortex XSOAR and EclecticIQ Intelligence Center
Address threats with confidence through the Cortex XSOAR App for EclecticIQ Intelligence Center. The Cortex XSOAR App for EclecticIQ Intelligence Center provides automated integration and facilitates centralized visibility, enabling security analysts to mitigate threats faster.
Download Solution BriefRecorded Future and EclecticIQ Intelligence Center
With EclecticIQ’s integration of Recorded Future, analysts quickly prioritize indicators of compromise (IOCs). Using the Intelligence Center’s graph and advanced search functions, analysts can promptly align these IOCs to tactics, techniques, and procedures (TTPs).
Download Solution BriefQualys and EclecticIQ Intelligence Center
With EclecticIQ Intelligence Center’s built-in integration with Qualys, your SOC and CTI teams augment vulnerability prioritization – and remediation – based on real-world threats. EclecticIQ’s enrichment of alerts and telemetry and targeted Knowledge Packs ensure that SOC and vulnerability management (VM) analysts focus on probable rather than possible to optimize SOC operations.
Download Solution BriefSilobreaker and EclecticIQ Intelligence Center
Together, EclecticIQ and Silobreaker help threat intelligence teams integrate structured and unstructured threat data, contextualize unique indicators, and respond faster to impending threats.
Download Solution BriefSplunk and EclecticIQ Inteligence Center
With EclecticIQ Intelligence Center's built-in integration with Splunk Enterprise and Splunk Phantom, your SOC, SOAR, and CTI teams prioritize and accelerate their threat response.
Download Solution BriefA Financial Heavyweight Makes Threat Intelligence Actionable with EclecticIQ Intelligence Center
A case study of how a financial heavyweight makes threat intelligence actionable with EclecticIQ Intelligence Center
Download Case StudyEclecticIQ Empowers a National CERT’s Collaborative Threat Intelligence Sharing Community
Implementing a unique hub-and-spoke TIP architecture lowers false positives, enhances collaboration, and improves cyber situational awareness and resilience
Download Case StudyTriage & Collaboration: Improving a major bank's cyber threat security posture
Learn how a major bank implemented a single Threat Intelligence Platform (TIP) to support multiple lines of business across its global footprint.
Download Case StudyAccelerate Incident Response with Threat Intelligence
This paper explains how Threat Intelligence improves Incident Response (IR) and how to introduce Threat Intelligence into your IR practice - with two use cases from Fox-IT.
Download White PaperAugment your SOC with human-led threat intelligence
Learn about the limitations of automation in the Security Operations Center. Find out why SOCs should let humans take the lead in handling intelligence. Discover how to achieve the benefits of an integrated, intelligence-led cyber defense capability powered by a Threat Intelligence Platform.
Download White PaperBeyond the IOC with Cyber Threat Intelligence (CTI)
Focusing on tactics, techniques, and procedures (TTPs) to better protect your organization
Download White PaperEclecticIQ Retrospective: A Look at the Themes & Events That Shaped the 2022 Cyber Landscape
EclecticIQ’s Intelligence & Research Team looked back on the growth and changes that took place in cybersecurity in 2022, as well as a brief look ahead to 2023.
Download White PaperSTIX 2.1 and Beyond - The Essential Role of STIX in CTI Operations
This White Paper highlights the exciting capabilities of STIX 2.1 and provides clear guidance on mapping out the optimal role of STIX in your cyber threat intelligence operations (CTI-Ops) to better meet your stakeholders’ needs.
Download White PaperThe Tradecraft of a Successful Threat Investigation: A COVID-19 Case Study
What does it take to run a successful threat investigation with global implications? Since February 2020, we at EclecticIQ have tracked adversaries as they put their malicious tactics, techniques, and procedures (TTPs) into high gear to take advantage of organizations shifting focus from security to the COVID-19 health crisis.
Download White PaperThreat Data Ingestion: Get the Best of Both Worlds
Selecting a threat intelligence platform (TIP) is a complex decision that often puts the CTI and the IT Ops teams at odds with each other. The CTI team demands high-fidelity threat data. The IT Ops team requires a TIP with predictable and manageable scalability.
Download White PaperUsing a Robust Platform for Training Purposes
Cyber threat analysts are hard to find, and are being heavily recruited by enterprises and governments. The problem is that threat intelligence has a steep learning curve, even for IT professionals in related fields. That’s why Cyber Threat Intelligence Network (CTIN) advocates a new approach to training cyber threat analysts: Use a Threat Intelligence Platform (TIP) as a hands-on instructional tool.
Download White PaperSANS Cyber Threat Intelligence Survey Report 2020
Download your complimentary copy now
Download Survey ReportSANS 2022 Cyber Threat Intelligence Survey
Read the full report to learn what trends SANS has discovered and to get guidance on how you can get the most out of CTI.
Download Survey ReportRansomware as a Smokescreen for Nation-State Sponsored Espionage Operations
There is a general consensus around the financial motivation behind ransomware campaigns. While this holds true, in this presentation we are going to look into alternative hypotheses where cyber-criminal gangs cooperate with nation states to target victims in order to steal data of value for the nation state sponsoring the operation, hiding the nation state attribution and the espionage motive behind the cyber-criminal gang attribution and financial motive.
Watch RecordingUnderstanding the Ransomware Landscape
This talk consists of 3 main parts: a historical overview of the ransomware phenomenon, how Cyber Threat Intelligence driven security can prevent a ransomware attack by providing the strategic, operational and tactical intelligence, and a description of a worst case scenario resulting from a successful ransomware attack against a targeted victim.
Watch RecordingCTI Collaboration Using STIX and Elasticsearch
In this talk we explore the concepts that underpin true intelligence collaboration and describe a means to achieve it using STIX and elasticsearch.
Watch RecordingHow to Leverage CTI to Defend From Ransomware
How CTI can be leveraged in practical terms from a tactic and a strategic point of view.
Watch RecordingLessons Learned Implementing Intelligence-led Security
We have invited Carol Geyer, Chief Development Officer from OASIS, to discuss how the adoption of STIX and TAXII might transform the CTI practices of organizations. Further, during this webinar we will look at some of the issues that central government and enterprises face, when setting up CTI capabilities.
Watch RecordingPreventing Cybercrime with SOC Augmentation
The Kaspersky and EclecticIQ collaboration on their portfolio of integrations guarantees high-end Cyber Threat Intelligence analysis, empowering organizations to stay ahead of cybercrime. This webinar shows the strength of our combined portfolio and offering, with a product demonstration.
Watch RecordingNarrator: Generating Intelligence Reports from Structured Data
Explore the role of Natural Language Generation (NLG) in the cyber threat intelligence domain.
Watch RecordingCTI-Powered Cyber Security Operations
EclecticIQ and Kaspersky came together to present a Webinar for Practitioners, by Practitioners. We demonstrated the benefits of a security operation center (SOC) powered by cyber threat intelligence (CTI)—and we’re proving our findings with live demos.
Watch RecordingHow to overcome the Threat Intelligence Cycle Paralysis?
Demonstration on how to overcome threat intelligence paralysis by using a ransomware campaign and botnet threat, by providing context through their relationships with each other and additional threats.
Watch RecordingSANS Webcast: While You Were in Lockdown - Cyberattacks Against Decentralized Finance Had a Banner Year
How threat actors and cyberattacks are consolidating around emerging targets of the decentralized finance powerhouse.
Watch RecordingCase study: A Financial Heavyweight Makes Threat Intelligence Actionable
A 30-minute presentation and demonstration shows how a world-class CTI team has made threat intelligence actionable by replacing their previous threat intelligence platform (TIP) with EclecticIQ Intelligence Center.
Watch RecordingDemo: EclecticIQ Intelligence Center's hub-and-spoke model
This demo recording shows how to leverage EclecticIQ Intelligence Center for sharing intel between different agencies and organizations in an intelligence sharing network.
Watch RecordingTurning Raw Data Into Actionable Intelligence
Learn how to improve your vulnerability management and incident response process in this TIP walk-through.
Watch RecordingMaking Sense of Unstructured Data
How to effectively process and analyse unstructured data using STIX 2.1 featuring speakers from OASIS Open, Elemendar and EclecticIQ.
Watch Recording