Fortinet white logo
Fortinet white logo
25.2.0

Features

Features

The following are the key features of this solution:

  • Outbreak Management: Provided by FortiGuard, this feature equips the platform with tools to monitor and manage the containment and resolution of widespread attacks or breaches. It enables organizations to rapidly assess the scope and impact, ensuring efficient coordination of response efforts.
  • Threat Intel Search: The platform enables users to query FortiGuard's extensive threat intelligence database to uncover details about Indicators of Compromise (IOCs), including associated malware, threat actors, CVEs, and related threat correlations. This empowers analysts with contextual insights to accelerate threat validation and informed response.
  • Threat Intelligence Management: This component allows users to collect, analyze, and store threat intelligence from multiple sources. It facilitates the enrichment of data with contextual insights to better understand the nature, intent, and tactics behind threats.
  • CVE Correlation with Threat Feeds: By correlating CVE (Common Vulnerabilities and Exposures) data with active threat feeds, the platform helps organizations quickly identify which vulnerabilities are actively being targeted by adversaries. This feature enables proactive defense by focusing resources on high-risk vulnerabilities.

This Threat Intelligence Platform is a vital tool in enhancing cybersecurity resilience, providing organizations with the tools to stay ahead of evolving threats and mitigating risks before they become significant issues.

Features

Features

The following are the key features of this solution:

  • Outbreak Management: Provided by FortiGuard, this feature equips the platform with tools to monitor and manage the containment and resolution of widespread attacks or breaches. It enables organizations to rapidly assess the scope and impact, ensuring efficient coordination of response efforts.
  • Threat Intel Search: The platform enables users to query FortiGuard's extensive threat intelligence database to uncover details about Indicators of Compromise (IOCs), including associated malware, threat actors, CVEs, and related threat correlations. This empowers analysts with contextual insights to accelerate threat validation and informed response.
  • Threat Intelligence Management: This component allows users to collect, analyze, and store threat intelligence from multiple sources. It facilitates the enrichment of data with contextual insights to better understand the nature, intent, and tactics behind threats.
  • CVE Correlation with Threat Feeds: By correlating CVE (Common Vulnerabilities and Exposures) data with active threat feeds, the platform helps organizations quickly identify which vulnerabilities are actively being targeted by adversaries. This feature enables proactive defense by focusing resources on high-risk vulnerabilities.

This Threat Intelligence Platform is a vital tool in enhancing cybersecurity resilience, providing organizations with the tools to stay ahead of evolving threats and mitigating risks before they become significant issues.