Intelligence / Threat Hunting

We help you navigate through alert “noise” by focusing on the highest-priority threats

 

Endpoint protection, firewalls, email security and other tools are creating an endless stream of events creating more noise that most corporations know what to do with. However, when this event stream is enriched with the correct device context and role, the appropriate response and level of severity becomes clear to the operator.

Event activity coupled to device relevance allows our technology to calculate an impact analysis and rank assets for remediation.

laptop-fills-vulnerability-1

UncommonX provides security coverage based on many common sources and a deep and valuable set of intelligence collected and enriched to create a more effective solution.

 

While UncommonX consumes all available open threat feeds such as the Open Threat Exchange (OTX) and the Malware Information Sharing Platform (MISP) intelligence feed supported by CIRCL, we also harvest threat intelligence in real time, and at a global scale, across both the public internet as well as subversive, “Dark-Web” networks such as TOR and I2P.

To power this type of hyper-dissection across an infinitely dynamic data domain, we turned to the latest in hyperconverged infrastructure and service meshing within our own private cloud infrastructure.

We enable proactive threat hunting by providing easy to access and digest central intelligence that provides a comprehensive assessment of vulnerabilities.

threat-hunting-hands-800x594