This website uses cookies to make the content more user-friendly and effective. By using this website, you agree to the use of cookies. You can find additonal information about the use of cookies and the possibility of objecting to the use of cookies here.

Use #itsa19

6 - 8 October 2020 // Nuremberg

Posting print layout

What information should be shown in the print layout?

Create print layout
Exhibitors & Products it-sa 2019
Zoom product LOGO_Threat Intelligence Management Use Case

Threat Intelligence Management Use Case

LOGO_Threat Intelligence Management Use Case

Threat Intelligence Management Use Case

Request information Request information

Contact us

Please enter your personal information and desired appointment. You can also leave us a message.

Your personal information

Your message for us

Desired appointment during the exhibition

* Compulsory fields you must fill in.

Information on data protection can be found here.

Your message has been sent.

You do not have a registration yet? Register now and use all advantages of the Exhibitors and Products Database, the supporting programme and the TicketShop.

An error has occurred.

Our approach to Threat Intelligence Management:

Analysts need a way to automatically ingest, consolidate, normalize and de-duplicate threat intelligence data in one manageable location. While this external cyber threat data is commonly well-defined and understood, additional context from within the organization can vary wildly between industry verticals and companies. It’s vital that the threat intelligence management solution be able to consume and store these different data types as well as provide the capability to tailor data models to fit security teams’ needs.

The next step is to prioritize the vast amounts of threat data aggregated in this central repository. However, what is a priority to one company may not be relevant to another. What is needed is the ability for analysts to control how scoring, prioritization and expiration should be done – tell the system what is more important and less important once, and let the system automatically score and re-score when new data and context is learned. As more data comes in, the threat intelligence management system will automatically tune itself, creating a threat library that provides consistent information tailored specifically for the company.

The repository serves as a centralized memory to facilitate future investigations. Security teams can operate from a single source of truth, passively collaborating through the instantaneous sharing of knowledge and using their tools of choice to improve security posture and reduce the window of exposure and breach.

Integration with an ecosystem of data sources is streamlined and cost effective using open APIs at no additional cost, and can be further tailored with an SDK. For broad visibility, the system must be designed to be integrated with all systems that provide or leverage threat data within the organization.


  • Contextualized, relevant intelligence in a database that is customized for the organization’s environment and risk profile.
  • Focus, noise reduction and decision support during investigations and triage.
  • Greater shared understanding of relationships across objects and object types to better support investigations and threat intelligence management.
  • The freedom to spend more time performing analysis versus manual tasks.
  • Orchestrated and synchronized threat intelligence management across all teams and tools so they can work in concert and increase effectiveness, efficiency and productivity.

This embedded video is provided by YouTube. When the video plays, usage data is transmitted to YouTube. If you agree, click "Start Video" to play the video.

Product video

 Play video 

You decided to attend the it-sa? Get your tickets at the TicketShop


The selected entry has been placed in your favourites!

If you register you can save your favourites permanently and access all entries even when underway – via laptop or tablet.

You can register an account here to save your settings in the Exhibitors and Products Database and as well as in the Supporting Programme.The registration is not for the TicketShop and ExhibitorShop.

Register now

Your advantages at a glance:

  • Advantage Save your favourites permanently. Use the instant access – mobile too, anytime and anywhere – incl. memo function.
  • Advantage The optional newsletter gives you regular up-to-date information about new exhibitors and products – matched to your interests.
  • Advantage Call up your favourites mobile too! Simply log in and access them at anytime.