The FASTEST way to consume threat intelligence.
CIF allows you to combine known malicious threat information from many sources and use that information for incident response, detection and mitigation. The most common types of threat are ip addresses, domains and urls. Indicators best used for protecting your network.
- It only takes 10min or less...
- Get your data into Snort, Bro, Suricata, Bind and PaloAlto..
- Lessons learned from 10+ years of industry wide threat intel experience
- Lessons learned from other CSIRTs around the world
- API and performance driven so you can integrate with your own workflow, not ours.
- See our Support Options
- Less time spent on local customization and deployment
- Influence over future features
- Faster resolution for bugfixes
- No sales calls or long term commitments
- MORE FREE TIME to do what you do best, protecting YOUR Internet!
Where do I start?
- [stable] CIFv3 - https://github.com/csirtgadgets/bearded-avenger-deploymentkit/wiki
- [technical preview] CIFv4 - https://github.com/csirtgadgets/verbose-robot
We build content and tools, for CSIRTs.
Are we saving you time and expensive developer cycles? Are we giving you an edge?
Consider taking out a subscription!