
Overview
The IBM® Threat Intelligence Insights capability of IBM Cloud Pak® for Security offers detailed, actionable threat intelligence, based on a customized profile and environmental telemetry. Prioritize the threats most relevant to your business. Investigate threats across multiple siloed sources and remediate cyber threats — all from a single console.
Key Highlights
Reduce investigation time
Separate the signal from the noise with an adaptive risk score that allows you to prioritize relevant threats.
Increase environment visibility
Scan your connected data sources to search across your environmental assets for malicious indicators.
Act fast
Quickly and efficiently resolve your threat by seamlessly moving from threat intelligence to investigation and remediation.
Drive consistency and visibility
Gain actionable threat intelligence
Get contextual threat reporting from multiple key sources.
Prioritize relevant threats
Get a personalized, adaptive IBM X-Force® Threat Score.
Identify active threats
Use continuous automated searches to find threats.
Act fast to resolve threats
Speed resolution with end-to-end threat management.
What is Threat Intelligence Insights?
Threat Intelligence Insights is an app on Cloud Pak for Security that delivers unique and relevant threat intelligence prioritized for your organization. It seamlessly integrates with other apps on Cloud Pak for Security to further continue the investigation and remediation processes.
Where does Threat Intelligence Insights source its information from?
The information provided by Threat Intelligence Insights on any type of search is sourced from internal infrastructure and databases, as well as from open-source content and third-party partnerships. X-Force Premier Threat Intelligence Reports are curated and published by the X-Force IRIS team.
What is included in the X-Force Premier Threat Intelligence Reports?
The X-Force Premier Threat Intelligence Reports are curated and published by the IBM X-Force Incident Response and Intelligence Services team. There are five types of reports including: Threat Activity, Malware Analysis, Threat Group, Industry Analysis and Early Warning Research.