PolySwarm Malware Threat Intelligence delivers insights into global threats and malware intelligence. It provides crowd-sourced malware information along with relevant indicators of compromise (IOCs). Key Use Cases: The PolySwarm App for Splunk supercharges your security operations with these core capabilities: Fresh Malware Intelligence: Access a continuous stream of newly identified malware intelligence sourced through PolySwarm's innovative crowdsourced model, providing early warnings of emerging threats directly within your Splunk dashboards and alerts. File Hash Enrichment and Searches: Enrich Splunk events containing file hashes with PolySwarm's comprehensive malware intelligence. Quickly search for known malicious hashes and gain immediate context on their Malware Score, Malware Family, and different hashes. IOC Enrichment and Searches (Hash, C2 IP, Domain, MITRE TTP): Expand your threat investigations by enriching various Indicators of Compromise (IOCs) within Splunk. Search by file hashes, command-and-control (C2) IPs, domains, and even MITRE ATT&CK TTPs to uncover related threats and understand attacker tactics. Sector-Based IOC Searches for Proactive Threat Hunting: Leverage PolySwarm's ability to categorize IOCs by industry or sector. Proactively hunt for threats specifically targeting your sector, enabling you to anticipate and mitigate potential attacks before they impact your organization. Customer Input Driven, daily/hourly Malware Family and Industry-specific Updates: Stay informed about the malware families that matter the most based on your organization's threat landscape and intelligence requirements. Configure the app to receive specific malware families and/or Industry or Sector malware threat intelligence updates. Replacement and Competitive for - VT4Splunk, VirusTotal, Google Threat Intelligence,
(0)
Categories
Created By
Type
Downloads
Licensing
Splunk Answers
Resources