TrustRadius: an HG Insights company

ThreatConnect Threat Intelligence Operations Platform

Score8.7 out of 10

6 Reviews and Ratings

Reviews

3 Reviews

Fully customizable ThreatConnect Threat Intelligence Operations Platform

Rating: 10 out of 10
Incentivized

Use Cases and Deployment Scope

ThreatConnect Threat Intelligence Operations Platform has an extensive Playbook & Custom APP capabilities. As they have an HTTP Client engine, you can integrate it with literally any system that supports RESTful APIs or TAXII servers (which is pretty much supported by all big solutions or security technologies). This means that you can, without any help, build your own playbook to integrate with any system within the organization. This allows for an incredible level of automation and customization for your specific use cases and needs.

Additionally, ThreatConnect Threat Intelligence Operations Platform aggregates all feeds and intelligence data (IoCs, TTPs, etc.). in one unified platform - which makes it easier for analysts to make informed decisions.

Pros

  • Custom Playbook integration
  • Automated workflows and Tasks
  • Intelligence aggregation

Cons

  • Need to have more native (out of the box) integrations
  • Need more focused training courses and certificates

Likelihood to Recommend

ThreatConnect Threat Intelligence Operations Platform helps aggregates intelligence feeds and data from hundreds of sources into just one place. This provides ease of usability and allows for greater extent of workflow automation. The more security controls you integrate with ThreatConnect Threat Intelligence Operations Platform, they more insights and comprehensiveness you'll receive by it.

Additionally, ThreatConnect Threat Intelligence Operations Platform has a very powerful Case Management engine, which can help automate and reduce tasks for the team.
Vetted Review
ThreatConnect Threat Intelligence Operations Platform
1 year of experience

ThreatConnect

Rating: 8 out of 10

Use Cases and Deployment Scope

I utilize Threat Connect as a critical tool in my cybersecurity workflow. It enables me to design custom playbooks tailored to various scenarios, significantly improving our response time to security incidents. Additionally, these playbooks are instrumental in efficiently gathering and retrieving relevant data for different teams, enhancing overall team coordination and effectiveness in handling security challenges.

Pros

  • Intelligence gathering
  • Workflow creation
  • Playbook funtionality

Cons

  • A more stable UI
  • Modify the app creator funtion to be easier to use

Likelihood to Recommend

If ThreatConnect is going to be used to create playbooks the required technical knowledge and try and error that is required may not be for everyone. The application provides an app builder capability that is really useful but in order to be used the user needs to have intermediate to advanced programing abilities.
Vetted Review
ThreatConnect Threat Intelligence Operations Platform
1 year of experience

Game Changer Platform for automating Threat intel Workflows

Rating: 9 out of 10
Incentivized

Use Cases and Deployment Scope

In MSSP environment we use ThreatConnect TIOP as the central hub for all threat intelligence-related operations, while platform is integrated into our workflows for triaging alerts, enriching alerts, enriching IOCs, correlating data across client environments and triggering automated response actions we ingest threat intel from various open sources and while using ThreatConnect to normalize,enrich and prioritize this data

Pros

  • One of the most beneficial features of the ThreatConnect is its ability to automatically enrich IOCs from multiple sources such as VT WHOis and assign a dynamic threat score.

Cons

  • while playbooks are powerfull but building and troubleshooting complex workflows can be time consuming there is lack of guide and the documentation for common use cases.

Likelihood to Recommend

In MSSP enviroment ThreatConnect excels at ingesting and managing threat intel from multiple sources o while maintaining the data isolation per customers.