Several key concepts of threat intelligence

Source: Internet
Author: User

At present, the breadth and depth of the network space is expanding, the security confrontation is increasingly fierce, the traditional security thinking mode and security technology have been unable to effectively meet the needs of the security protection of enterprises and enterprises, the new security concept, new security technology has been emerging, the current network security is in a transformation and upgrading of the rising period.

at present, the information security industry is generally agreed that the idea is that only defense is not enough, More needs to be continuously detected and responded to. To achieve more effective detection and faster response, security information is essential.

Security intelligence is a broad concept that includes threat intelligence, vulnerability intelligence, Event intelligence and underlying data intelligence


gartner

strategic threat intelligence and for security devices or systems that drive their implementation of security control policies tactical threat Intelligence . Tactical threat intelligence is also known as machine-readable threat intelligence.

/

The production and consumption of threat intelligence constitute a closed loop of the intelligence ecosystem. the value of threat intelligence cannot be achieved unless production is consumed, and threat intelligence becomes water without only if consumption is not produced.

for enterprises and enterprises, the application/consumption of threat intelligence is the key to realize the value of information. All types of security devices should be able to consume threat intelligence, butmostThe key is the security management platform/socapplication of threat intelligence. Threat intelligence only has to do with Anguiping that are located in the corporate and organizational network security hub/socintegration, to maximize the value of intelligence, and then realize the whole network of threat-based information coordination.


Several key concepts of threat intelligence

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.