Threat

Intelligence

Data Enrichment Techniques, Security Feeds, detection of Data Exfiltration techniques.

Find out more Contact us

Threat Intelligence include:

  • Data Enrichment Techniques
  • Security Feeds
  • Data Exfiltration techniques detection
  • Custom rules for Open Source IDS/IPS
  • NetFlow analysis
  • Full Packet Capture
  • Security Onion customization
  • Early phase phishing alerting
  • Creation steps for Security Operation Center