GNL Dashboard: Threat Intelligence Sources

GNL Dashboard: Threat Intelligence Sources

PacketViper comes with its own unique set of threat intelligence sources.  Threat Intelligence requires a combination of people, process, and technology that integrate which deliver less false positives and stronger security.  Our Threat Intelligence is collected in several forms:



    • Crowd Sourced

    • Web Sourced

    • Sole Sourced 

    • Self Sourced


Crowd Sourced - PacketViper has secured partnerships in the efforts to exchange Threat Intelligence. When receiving this intelligence, we put it through a rigorous process of vetting and verification before it makes it our customers.

Web Sourced  - Hundreds of PacketViper processes scour the internet for data sources, which are then collected for analysis, viability, and verification against our Sole Sourced intelligence. 

Sole Sourced - PacketViper has built a purpose built sensor array using proprietary techniques to collect new and emerging threat sources. Our sensor array is never standing still providing it to gain better perspectives of threat sources. We have taken great care designing this array to provide the highest quality of intelligence.

Self Sourced - PacketViper provides the ability to build your own intelligence based on the network activity at your network perimeter in real-time. Using techniques like our Virtual Minefields (VMZ), you can build threat intelligence based on your network perimeter. By far one of our most unique PacketViper capability.

Enabling Threat Intelligence Lists

 




    • Related Articles

    • PacketViper Admin Guide - Version 5.9

      The v5 Admin Guide contains how-to information on configuration and policy creation scenarios as well as usage details to customize your PacketViper solution. Published: June, 2023
    • Creating a Grouping for High Risk Network Ports

      PacketViper can create Network Port Groupings to apply to Countries, Global Network Lists, Custom Rules, and triggers.  Below is a list of well-known malicious ports you may want to consider creating a grouping. While you could simply block these ...