Time
4 hours 42 minutes
Difficulty
Advanced
CEU/CPE
5

Video Transcription

00:07
Now let's move to the third type and final type off. Private data sources.
00:12
Threat Intelligence Platforms Threat Intelligence platform is defined as a piece of software or providers portal typically developed by security vendor,
00:23
which which organizes one or more feeds into single stream off threat intelligence
00:30
and that you can use in order to get alerts and medically data.
00:37
Most of these platforms offer a set of benefits. Let looks like this.
00:43
They combine thousands off feeds into single location. They enable you to receive alerts and real times. They can normalize feeds, feed data. They remove duplicates, enable users, said Truls et cetera. They can be integrated with some solution or firewalls, et cetera.
01:03
They can create reports,
01:06
and some off. The platforms can also include a feature off sandbox. Here is an example anomaly threat stream platform. Now, when it comes to advantages and disadvantages off these platforms
01:22
Ah, let's start with advantages are these platforms offer indicators with context and actionable indicators?
01:30
They are useful for enrichment.
01:34
They can aggregate multiple feeds and sometimes even finished intelligence or narrative based reports,
01:42
and they can have multiple integrations, including most known, some solutions.
01:49
However, these platforms are really expensive, especially if the include their own premium feats are collected from closer data sources
02:00
and like we've done for the other types of private data sources here I choose some examples like insights recorded future eclectic like you threat Kocian ce ultra from NC four and normally Threat Stream and true Star.
02:20
These, as always, are no
02:22
Onley providers within the marketplace, and these are not the best solutions. These are platforms that I am family. Or if this is why I choose to mention these are examples,
02:35
that's all for this lesson. Overall private threat sources are important investment for any organizations. Security poacher
02:45
in this video we've seen are the difference between the three types of private data sources. Ah, the Finnish intelligence, the threat intelligence feeds and the threat. Intelligence platforms with also discussed their advantages and their disadvantages.
03:00
We've also mentioned some example off vendors available on the market place,
03:07
and now it's up to you to discover what's the best option for your organization.
03:13
This doesn't mean that you have to truth now the most appropriate solution for your use case because we've only seen one type off external data collection sources
03:23
and, uh, I highly recommend watching the next video about the second type off external later sources, which is community sources,
03:32
because I believe it might be, in some cases, more suitable for your organization. So I will see you there.

Up Next

Advanced Cyber Threat Intelligence

Advanced Cyber Threat Intelligence will benefit security practitioners interested in preventing cyber threats. Learn how to leverage your existing data sources to extract useful information and find complementary information from external sources.

Instructed By

Instructor Profile Image
Alyssa Berriche
Instructor