Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 1 Rating

Total
ease
features
design
support

Description

The largest open threat intelligence community in the world fosters a collaborative defense through actionable threat data powered by its members. In the realm of cybersecurity, threat sharing often remains disorganized and casual, leading to significant gaps and challenges in response efforts. Our goal is to facilitate the rapid collection and dissemination of relevant, timely, and accurate information regarding new or ongoing cyber threats among companies and government entities, helping to avert major breaches or reduce the impact of attacks. The Alien Labs Open Threat Exchange (OTX™) transforms this ambition into reality by offering the first truly accessible threat intelligence community. OTX grants open access to a worldwide network of security professionals and threat researchers, boasting over 100,000 contributors from 140 nations who provide more than 19 million threat indicators each day. By delivering data generated by the community, OTX promotes collaborative investigations and streamlines the updating of security systems, ensuring that organizations remain resilient against evolving threats. This community-driven approach not only enhances collective knowledge but also strengthens overall cyber defense capabilities across the globe.

Description

LevelBlue Open Threat Exchange (OTX) is an all-encompassing platform for security information and event management (SIEM), aimed at delivering immediate insights and intelligence for both network and security operations. By using OTX, organizations can swiftly identify and tackle threats through features like asset discovery, vulnerability scanning, and log management. Its open architecture allows seamless integration with a variety of security tools and data sources, fostering a cohesive strategy for threat detection and response. This platform is crafted to bolster operational efficiency and strengthen security measures, making it an ideal solution for organizations of various sizes that aim to optimize their security processes. Moreover, OTX’s adaptability ensures that it can evolve with the changing landscape of cybersecurity challenges.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

Google Digital Risk Protection
Amazon Web Services (AWS)
Apache Airflow
Blueliv Threat Compass
Check Point CloudGuard
Cisco Vulnerability Management
Cloudflare
FortiGate NGFW
FortiManager
IBM Cloud
LevelBlue USM Anywhere
Microsoft 365
NopSec
NorthStar Navigator
Okta
OnSight
ServiceNow
Sophos Central Device Encryption
Zscaler

Integrations

Google Digital Risk Protection
Amazon Web Services (AWS)
Apache Airflow
Blueliv Threat Compass
Check Point CloudGuard
Cisco Vulnerability Management
Cloudflare
FortiGate NGFW
FortiManager
IBM Cloud
LevelBlue USM Anywhere
Microsoft 365
NopSec
NorthStar Navigator
Okta
OnSight
ServiceNow
Sophos Central Device Encryption
Zscaler

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

No price information available.
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

AT&T Cybersecurity

Founded

1983

Country

United States

Website

cybersecurity.att.com/open-threat-exchange

Vendor Details

Company Name

LevelBlue

Founded

2024

Country

United States

Website

levelblue.com

Product Features

Product Features

SIEM

Application Security
Behavioral Analytics
Compliance Reporting
Endpoint Management
File Integrity Monitoring
Forensic Analysis
Log Management
Network Monitoring
Real Time Monitoring
Threat Intelligence
User Activity Monitoring

Alternatives