The FASTEST way to consume threat intelligence.

CIF allows you to combine known malicious threat information from many sources and use that information for incident response, detection and mitigation. The most common types of threat are ip addresses, domains and urls. Indicators best used for protecting your network.

The Last Mile.

Where do I start?

Architecture

cif_overview.png