Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

IP Threat Intel offers instantaneous threat intelligence that aids security teams in minimizing alert fatigue and expediting triage processes within TIPs, SIEM, and SOAR platforms. It can be utilized as an API integrated into your existing systems or as a robust local database tailored for intensive on-premise operations. This feed delivers comprehensive data on IP addresses noted within the last month, detailing the specific ports that have been targeted by each address. With updates occurring every hour, it remains aligned with the evolving threat landscape. Each IP entry not only provides insights into the event volume from the past 30 days but also indicates the latest detection made by ELLIO's deception network. Additionally, it presents a complete list of all IP addresses identified today, with each entry featuring tags and comments that provide context regarding the targeted regions, volume of connections, and the most recent sighting by ELLIO's deception network. With updates every five minutes, this service guarantees that you have access to the latest information, which is crucial for effective investigation and incident response, helping to enhance your overall security posture.

Description

OpenText Core EDR serves as a comprehensive solution for endpoint detection and response, merging endpoint protection, security information and event management (SIEM), security orchestration, automation, and response (SOAR), alert triage, and vulnerability assessment into a singular platform, thereby removing the necessity of juggling multiple security tools. Its lightweight agent, equipped with pre-configured policies, allows for swift deployment within minutes and simplifies management across various devices without the need for intricate scripting. By effectively correlating events from endpoints, networks, and identities in real time, the integrated SIEM and SOAR playbooks highlight suspicious activities and automatically direct actions for containment, remediation, and investigation. The system is fortified with continuous, global threat intelligence that facilitates real-time monitoring, which is crucial for detecting malware, ransomware, zero-day vulnerabilities, and other sophisticated threats before they can proliferate, allowing for the prompt isolation or remediation of affected endpoints. This capability not only enhances security but also empowers organizations to respond proactively to emerging threats and maintain a resilient cybersecurity posture.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

JSON
Logstash

Integrations

JSON
Logstash

Pricing Details

$1.495 per month
Free Trial
Free Version

Pricing Details

No price information available.
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

ELLIO

Country

Czech Republic

Website

ellio.tech/ellio-ip-threat-intel

Vendor Details

Company Name

OpenText

Founded

1991

Country

Canada

Website

cybersecurity.opentext.com/products/threat-detection/endpoint-detection-response/

Product Features

Endpoint Detection and Response (EDR)

Behavioral Analytics
Blacklisting/Whitelisting
Continuous Monitoring
Malware/Anomaly Detection
Prioritization
Remediation Management
Root Cause Analysis

Endpoint Protection

Activity Log
Antivirus
Application Security
Behavioral Analytics
Device Management
Encryption
Signature Matching
Web Threat Management
Whitelisting / Blacklisting

SIEM

Application Security
Behavioral Analytics
Compliance Reporting
Endpoint Management
File Integrity Monitoring
Forensic Analysis
Log Management
Network Monitoring
Real Time Monitoring
Threat Intelligence
User Activity Monitoring

Alternatives

Darkfeed Reviews

Darkfeed

Cybersixgill
PURVEYOR Reviews

PURVEYOR

COUNTERVEIL