ThreatQ to bolster threat detection with Bitdefender threat intelligence; Bitdefender announced a strategic partnership with ThreatQuotient to incorporate Bitdefender Advanced Threat Intelligence into the ThreatQ™ Platform.
The partnership provides ThreatQuotient customers including enterprises with a security operation center (SOC), managed security services providers (MSSPs) and managed detection and response (MDR) providers greater visibility across the global threat landscape to enable detection that is more accurate resulting in accelerated response to threats.
ThreatQuotient’s mission is to improve the efficiency and effectiveness of security operations with a platform that accelerates and simplifies investigations and collaboration within and across teams and tools.
Bitdefender is a cybersecurity leader delivering best-in-class threat prevention, detection, and response solutions worldwide. Guardian over millions of consumer, business, and government environments, Bitdefender is the industry’s trusted expert for eliminating threats, protecting privacy and data, and enabling cyber resiliency.
“The proprietary real-time threat intelligence provided by Bitdefender strengthens our clients’ ability to accurately detect, assess and validate emerging threats so they can take faster actions to eliminate them from environments,” said Jonathan Couch, senior vice president strategy at ThreatQuotient.
He added, “Bitdefender is recognized globally for having best-in-class threat intelligence and threat detection capabilities validated by MITRE and other leading independent testing organizations. ThreatQ customers will have contextualized insights on advanced persistent threats (APTs), malicious email campaigns and other dangers under one centralized view to quickly assess, validate and respond. Our collaboration has proved invaluable to our customers by increasing visibility into malicious campaigns as threat frequency and sophistication continues to rise.”
Having accurate, and actionable threat intelligence is critical to effective threat detection and response. Gartner analysts write, “Threat intelligence is knowledge about who or what is on the other side, as well as how they operate. Trying to defend against every possible threat with limited resources is a losing proposition. Use TI to protect your organization from all the relevant adversaries. Further, use TI to decide which adversaries are in fact relevant.”
ThreatQuotient integrates Bitdefender’s threat intelligence feeds including file hashes, IP addresses and domains associated with advanced persistent threats (APTs); domains associated with malware; IP addresses associated with attacker command and control (C&C) servers; and phishing campaigns. Security teams using the ThreatQ platform incorporate these feeds based on specific threat detection needs leveraging easy to use and configure integration. Security Operation Centers (SOCs) and internal security teams receive all the latest threat updates without having to change configurations or write new software code.
Bitdefender Advanced Threat Intelligence is powered by the Bitdefender Global Protective Network (GPN), an extensive network of hundreds of millions of sensors continuously collecting endpoint threat data worldwide. Bitdefender Labs, an elite team of security practitioners, correlates GPN data against known indicators of compromise (IOCs), malware, malicious domains and URLs and performs deep analysis to discover unknown threats. This telemetry coupled with human and automated analysis results in hundreds of newly discovered threats each minute, validation of billions of threat queries daily and less false positives for security teams.
“Our collaboration with ThreatQuotient helps organizations become more cyber resilient as methods for evading detection become increasingly advanced,” said Andrei Florescu, vice president of product management, Bitdefender Business Solutions Group.
“Threat intelligence platforms like ThreatQ greatly improves detection capabilities and situational awareness across the entire operation while prioritizing SOC activities based on threat risk and potential impact,” commented Andrei Florescu.