The Cyware Intel Exchange Add-on integrates Cyware Intel Exchange with Splunk Enterprise to enable threat intelligence ingestion, correlation, and operational workflows.
Using this add-on, you can perform the following actions:
1. Ingest threat indicators from Cyware Intel Exchange into Splunk using KV Store–based lookups
2. Correlate indicators with Splunk events to identify sightings and support detection workflows
3. Visualize threat intelligence activity through prebuilt dashboards for indicators and correlation insights
4. Enrich and manage indicators directly from Splunk using operational actions such as updating status, applying tags, creating tasks or notes, and more
Categories
Security, Fraud & Compliance, Threat Intel
Resources
Log in to report this app listing