Overview
MISP Logo
MISP Logo
MISP Events
MISP Analysis

Product video
Professionally Repackaged for Security
MISP is a professionally repackaged version of an open source Cyber Threat Intelligence Platform, enhanced with advanced security features and offered as a ready to deploy solution. While the core software remains open source, Decyphertek charges a fee for the added security enhancements and streamlined deployment process. This ensures users receive a secure, reliable, and enterprise grade solution without the complexities of manual setup.
Built on Immutable Infrastructure
MISP is fortified by running within Docker on Flatcar Linux, an immutable operating system designed for security and stability. The immutable nature of Flatcar Linux ensures that the underlying system cannot be altered, significantly reducing the risk of unauthorized modifications or vulnerabilities. Additionally, MISP is secured behind a reverse proxy with self signed certificates, providing an extra layer of protection against potential threats. To simplify container management, Portainer is included to help users monitor and control their containers with ease.
Packed with Powerful Features
MISP is built with a host of powerful features that position it as a leading cyber threat intelligence platform. It is self-hosted, giving you full control over your environment, and is designed specifically for managing and analyzing threat intelligence. The platform centralizes threat data to ensure critical information is not missed. MISP features advanced threat data visualizations, customizable dashboards and reports, and automated threat correlation and analysis. Furthermore, it can integrate with other security tools via API, supports STIX formats, and offers flexible sharing mechanisms for collaboration. MISP also includes a robust correlation engine, and extensive data import/export capabilities. This makes MISP a comprehensive solution for cyber threat intelligence sharing and analysis.
Why Choose Decyphertek?
Decyphertek delivers secure, ready to deploy solutions built on open-source foundations. We prioritize security, ease of use, and scalability, allowing you to focus on your core business without worrying about the complexities of technology. Decoding technology, so you dont have to.
Highlights
- Features: Centralized threat data, Advanced visualizations, Customizable dashboards, Multi-source data ingestion, Automated threat correlation, Security tool integration, API support, STIX/TAXII compatibility, Flexible sharing, Robust correlation, Data import/export, Threat sharing, Collaboration tools, Event tagging, Real-time updates, Malware analysis, IOC management, cyber threat analysis
- Security: Immutable OS , Automated OS Updates , Reverse Proxy, Managed via Portainer
- Why Choose Us? : Secure , Ready to Deploy Solutions , Built on Open Source Foundations , Prioritize Security, Ease of Use, and Scalability. Decoding Technology, So You Dont Have To.
Details
Typical total price
$0.068/hour
Features and programs
Financing for AWS Marketplace purchases
Pricing
Free trial
Instance type | Product cost/hour | EC2 cost/hour | Total/hour |
---|---|---|---|
t2.medium | $0.03 | $0.046 | $0.076 |
t2.large | $0.03 | $0.093 | $0.123 |
t2.xlarge | $0.03 | $0.186 | $0.216 |
t2.2xlarge | $0.03 | $0.371 | $0.401 |
t3.medium | $0.03 | $0.042 | $0.072 |
t3.large | $0.03 | $0.083 | $0.113 |
t3.xlarge | $0.03 | $0.166 | $0.196 |
t3.2xlarge | $0.03 | $0.333 | $0.363 |
t3a.medium Recommended | $0.03 | $0.038 | $0.068 |
t3a.large | $0.03 | $0.075 | $0.105 |
Additional AWS infrastructure costs
Type | Cost |
---|---|
EBS General Purpose SSD (gp2) volumes | $0.10/per GB/month of provisioned storage |
Vendor refund policy
Refunds available upon request.
How can we make this page better?
Legal
Vendor terms and conditions
Content disclaimer
Delivery details
64-bit (x86) Amazon Machine Image (AMI)
Amazon Machine Image (AMI)
An AMI is a virtual image that provides the information required to launch an instance. Amazon EC2 (Elastic Compute Cloud) instances are virtual servers on which you can run your applications and workloads, offering varying combinations of CPU, memory, storage, and networking resources. You can launch as many instances from as many different AMIs as you need.
Version release notes
Additional details
Usage instructions
Resources
Vendor resources
Support
Vendor support
While we do not offer formal support, we provide comprehensive technical documentation via Read the Docs to assist with setup, configuration, and troubleshooting. If you encounter any bugs or misconfigurations, please feel free to email us at adminotaur@decyphertek.io , and we will address them as part of our commitment to improving the platform.
AWS infrastructure support
AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.