Contextual data for faster security threat detection and resolution

With built-in threat detection module and advanced threat analytics add-on, you can block malicious sources, prevent data breaches, intercept malicious site visits. Combining both open source and commercial threat feeds, this integrated platform reduces false positives, speeds up threat detection, and helps triage critical security threats.


Spot and mitigate

  • Users visiting blacklisted and risky URLs and domains.
  • Malicious IPs trying to access your critical resources.

Get insights into

  • The geolocation of malicious actors attempting to intrude.
  • Attack techniques.

Security use cases that Log360's Threat Intelligence Solution can solve

Stop attack attempts at the earliest

Exploiting public-facing machines and known vulnerabilities is still one method hackers use to intrude into a network. With Log360's preconfigured Threat Alerts, enterprises can stop not only the communication from a malicious source but also automatically trigger a workflow to add blacklisted IPs to the firewall and permanently block them.

Threat intelligence solutions
Cyber security threat intelligence

Prevent data exfiltration

If an attacker intrudes into the network using stolen credentials or any other means and tries to extort sensitive data and send it to their command-and-control server, Log360 can immediately detect and stop such communication. Log360's Threat Intelligence Solution checks all outbound communication; alerts the concerned analyst about communication to malicious IPs, domains, or URLs; and terminates the connection immediately. All of this happens in real time.

Triage security alerts

Detecting which security alert poses the greatest risk to the enterprise is a challenging task for every security professional. Log360's Advanced Threat Analytics module identifies threats and attack types including malware, phishing, and other known attacks. These contextual insights can also be leveraged in the incident investigation module to better corroborate threats and prioritize their resolution.

Cyber threat intelligence solutions
threat intelligence loading=

Reduce false positives

Log360 enriches its real-time event response system with contextual information, such as the reputation score of an IP that's trying to remotely log in to critical servers, or the geolocation of an IP trying to remotely connect to the VPN. This provides more visibility into network behavior and helps differentiate suspicious activities from legitimate ones.


Open source threat feeds and commercial threat data

Log360 supports the following open source threat feeds


Commercial threat intelligence partners

Webroot BrightCloud® Threat Intelligence Services delivers real-time, accurate threat feeds on malicious URLs, IPs, files, and more. By ingesting these feeds dynamically, Log360's Advanced Threat Analytics module provides visibility into threat activity in your network and helps prioritize critical threat alerts.

How to spot and block malicious traffic inflow using Log360

Cybersecurity threat intelligence resources

Threat intelligence solution - Datasheet

How do you find yourself against threats you don't know about? According to AV-TEST, an independent security research institute, around 350,000 malware instances are created each day.

Spotting malicious traffic using ManageEngine's threat intelligence platform - Solution Brief

Monitoring the traffic on your network is essential if you want to keep attackers at bay, and ensure your organization runs smoothly and efficiently.

ManageEngine's security intelligence solution - Use case video

Detecting malicious traffic using threat intelligence and associating workflow profile with alert

Cybersecurity Threat Outlook - Whitepaper

Insights on 2022's threat landscape and how you can secure your network from them.


Frequently asked questions

1. What is threat intelligence?

Threat intelligence is a critical component of cybersecurity that provides valuable insights into potential malicious sources. This knowledge helps organizations in proactively identifying and preventing cyberattacks. By leveraging threat feeds like STIX/TAXII, organizations detect potential attacks in their network, facilitating the swift detection and tracking of targeted attacks.

Threat intelligence is essential for proactive defenses, effective incident response, risk management, situational awareness, collaboration, and compliance. It empowers organizations to stay ahead of threats, make informed decisions, and strengthen their overall cybersecurity posture.

2. What are the three types of threat intelligence data?

The three types of threat intelligence data are:

  •  Strategic intelligence: It help organizations with strategic planning and decision-making by providing high-level insights into long-term trends, motives, and goals of threat actors.
  •  Operational intelligence: It offers real-time information about ongoing threats, vulnerabilities, and active attack campaigns, which helps swiftly detect and respond to security threats.
  •  Tactical intelligence: It focuses on the specific tools, techniques, and procedures (TTPs) used by threat actors, helping security admins develop effective counter measures and enhance defensive capabilities.

3. What are the six phases of threat intelligence?

The threat intelligence life cycle comprises six phases:

  • Planning and direction: Define the goals, resources, and scope of the threat intelligence program.
  • Collection: Gather relevant data from various sources, such as open-source intelligence, vendors, and threat feeds.
  • Processing: Organize and analyze the collected data to derive valuable insights.
  • Analysis: Comprehend threats, their impact, and the tactics employed by threat actors through pattern recognition and indicator identification.
  • Dissemination: Distribute intelligence with relevant stakeholders to guide decision-making and prompt appropriate actions.
  • Feedback and improvement: Gather feedback, evaluate the efficacy of the program, and use insights to improve future efforts.