Intel471-Logo-white.png
Resources

Data Sheets

Adversary-Intelligenve-Data-Sheet-1200-×-600-px.png
Data Sheet

Adversary Intelligence

Intel 471's Adversary Intelligence provides proactive and groundbreaking insights into the methodology of top-tier cybercriminals.

ASP-Data-Sheet-1200-×-600-px.png
Data Sheet

Attack Surface Protection

Intel 471’s Attack Surface Protection is our suite of solutions, each geared for different users at different stages in their attack surface journey.

Behavioral-Threat-Hunting-2.png
Data Sheet

Behavioral Threat Hunting

Behavioral threat hunting uses security event data to identify patterns of behavior based on adversary intelligence that reveal a specific actor’s tactics, techniques, and procedures (TTPs) inside an environment. By studying how specific threat actors have used tools, systems, and software to achieve their goals, threat hunters can identify expected behaviors within the “cyber kill chain” that indicate network pivoting, expansion or exfiltration.

Credential-Intelligenve-Data-Sheet-1200-×-600-px.png
Data Sheet

Credential Intelligence

Intel 471’s Credential Intelligence provides complete coverage across the underground marketplace.

Cyber-Geopolitical-Intelligence-Datasheet-thumbnail-3.png
Data Sheet

Cyber Geopolitical Intelligence

Cyber Geopolitical Intelligence from Intel 471 provides a unique lens to organizational leaders about shifting regional alliances, trade disputes, territorial conflicts and diplomatic crises that we believe will impact the cyber threat landscape.

Cybercrime-Intelligence-Data-Sheet-1200-×-600-px.png
Data Sheet

Cybercrime Intelligence

Intel 471's Cybercrime Intelligence provides proactive and groundbreaking insights into the methodology of top-tier cybercriminals - target selection, assets and tools used, associates and other enablers that support them.

HUNTER-Guided-Threat-Hunts-Datasheet.png
Data Sheet

HUNTER Guided Threat Hunts

Intel 471 HUNTER Guided Threat Hunts helps your threat hunters overcome these obstacles so your team can quickly find, neutralize, and report undetected threats.With the preview launch of Guided Threat Hunts, HUNTER now offers a Pivot Queries library for HUNTER hunt packages that helps hunters pivot on query result data and progress their hunt for adversary behaviors.

Malware-Intelligence-Data-Sheet-1200-×-600-px.png
Data Sheet

Malware Intelligence

Intel 471 Malware Intelligence allows you to actively track weaponized and productionized threats.

Marketplace-Intelligence-Data-Sheet-1200-×-600-px.png
Data Sheet

Marketplace Intelligence

Intel 471 Marketplace Intelligence offers insights into the most important and active underground marketplaces.

The-Hunt-Management-Module.png
Data Sheet

The Hunt Management Module

Threat hunt teams need tooling to manage hunt processes and ensure that hunt outcomes drive proactive security operations. The Hunt Management Module guides the management of hunts, including research, testing, results, and reporting, helping teams develop consistent, rigorous, and repeatable processes that improve the organization’s security posture, controls, and policies.

Vulnerability-Intelligence-Data-Sheet-1200-×-600-px.png
Data Sheet

Vulnerability Intelligence

Intel 471’s Vulnerability Intelligence provides both relevant and timely intelligence information about the adversary.

Sign up for our Executive Intel Update

Stay informed with our weekly executive update, sending you the latest news and timely data on the threats, risks, and regulations affecting your organization.