Overview

Designed by analysts but built for the entire team (security operations, threat intelligence, incident response and security leadership), ThreatConnect's intelligence-driven security operations platform is the only solution available today with intelligence, automation, analytics, and workflows in a single platform. Centralize your intelligence, establish process consistency, scale operations, and measure your effectiveness in one place. To learn more about our threat intelligence platform (TIP) or security orchestration, automation, and response (SOAR) solutions, visit www.ThreatConnect.com.

Products

ThreatConnect is an intelligence-driven security operations platform that drastically improves your ability to put security data in context with intelligence and analytics, establish process consistency with playbooks, workflows and a centralized system of record, and measure the effectiveness of your organization with cross-platform analytics and customizable dashboards.

Contracts

GSA Schedule Contracts

GSA Schedule 70

GSA Schedule 70 GSA Schedule No. GS-35F-0119Y Term: December 20, 2011- December 19, 2021


SEWP Contracts

SEWP V

Contract Number: Group A Small: NNG15SC03B Group D Other Than Small: NNG15SC27B Term: May 1, 2015 - April 30, 2020


State & Local Contracts

Maryland Master Contract (COTS)

Project No.: 060B249002, Term: September 30, 2027

Ohio State Contract- 534354

Contract # 534354 Term: December 19, 2021


Resources

SELECT Resource_ID, Title, Vendor, Vertical, Type, DateAdded, Path, Linktype, InvisibleBit, FeaturedEnd, FeaturedBit, Description, CustomLogo, LegacyLink, Form FROM Resources WHERE Vendor = ? AND InvisibleBit = 0 ORDER BY FeaturedBit DESC, Type ASC

Datasheet

Uniting Cybersecurity People, Processes, and Technologies Behind an Intelligence-Driven Defense

Intelligence-Driven Defense Supercharged with In-Memory Computing

Guide

When You Lack People, You Have to Rely on the Process, or Better Yet, a Platform for Rapid Detection and Response.

Resources

The ThreatConnect® Platform was built to be open and extensible. We strive to integrate with the tools and technologies in our customers’ existing ecosystem, and work with vendors across every category to make security easy and effective.

Video


Whitepaper

Understand how you can make smarter decisions to move faster — both blocking an adversary and disrupting them altogether — by using orchestration with intelligence.

Discover the state of your current threat intelligence program and uncover a roadmap to getting ahead of today’s threats.

How to close the detection deficit between attackers and defenders, eliminate silos, and build a cohesive defense.