TAG Cyber recognized ThreatQuotient as Distinguished Vendor in their Security Quarterly report for Q3 2021.ThreatQuotient as cyber security solution providers to be featured in the report, which offers expert guidance, research and analysis, and education across the entire cyber security ecosystem.
In 2021, the frequency and scale of cyberattacks has increased and affected businesses and critical infrastructure ranging from hospitals to power plants. Amid the growing intensity and risks associated with these threats, enterprises, governments, and individuals are in need of more research and resources to protect against the damage cyber attacks can inflict on vital systems. To address security personnel shortages and an industry need for more curated and data-driven threat intelligence, ThreatQuotient recently announced two new capabilities built into the ThreatQ platform, ThreatQ TDR Orchestrator and ThreatQ Data Exchange.
“Existing approaches to security automation work for repetitive tasks, but to actually support detection and response needs, the focus of automation should be on the data and not the processes. ThreatQuotient is helping organizations focus on what is learned from their data, resulting in stronger detection and response,” said Leon Ward, VP Product Management, ThreatQuotient.
Also added, “ThreatQuotient is building on this approach to improve overall security operations, as well as strengthen industry threat intelligence sharing. We are pleased to be included in TAG Cyber’s report as a distinguished vendor, and we appreciate their work to further educate the market on timely threats and leading solutions.”
Katie Teitler, VP of Research and Advisory at TAG Cyber, added, “We are thrilled to feature ThreatQuotient in this publication. Given the rise of ransomware, phishing and other attacks this year, their insights on achieving efficiency in security operations and curating data for effective automation to defend against attackers are of great interest and importance to IT and security professionals right now.”