Listing Thumbnail

    ThreatQ for Data-Driven Security Operations: Professional Services

     Info
    The ThreatQuotient™ Professional Services team delivers end-to-end services to transform the capabilities of enterprise security operations. These services empower enterprises to seamlessly deploy ThreatQ into their ecosystem, bolster their teams’ effectiveness through hands-on training, and continuously strengthen the use of threat intelligence in their security operations.
    Listing Thumbnail

    ThreatQ for Data-Driven Security Operations: Professional Services

     Info

    Overview

    ThreatQuotient Professional Services Overview: ThreatQ provides professional services for our clients at all levels of security operations and threat intelligence maturity. We leverage industry-leading practices and expertise from our personnel with over 50 years of combined commercial and government threat intelligence and operational cybersecurity experience.

    Our services provide the core capabilities to assess, design, and build your data-driven threat intelligence function. The Professional Services team identifies the people, processes, and technologies necessary to effectively integrate intelligence into security operations and cyber risk management programs. These services enable the enterprise to transition from traditional signature-based monitoring, detection, and response to an external threat-focused operations program.

    Integration & Implementation

    • ThreatQ Platform Installation and Configuration
    • Custom Integration Development Services
    • Custom Workflow Development Services
    • Process Development

    Consulting Services

    • Security Operations Essentials
    • Security Operations Workflow Development

    THREATQ Academy

    • ThreatQ Security & Intelligence Operations Training
    • ThreatQ Platform Administration Training
    • ThreatQ Integration Development Training
    • Cyber Threat Intelligence Foundations

    Highlights

    • An extensible data model enables you to configure custom objects to support additional data types and address a wide range of use cases including vulnerability management, threat intelligence management, spear phishing, threat hunting, alert triage, and others.
    • Dynamic scoring automatically scores and prioritizes internal and external intelligence based on your parameters.
    • Smart Collections enable you to define specific data groups for categorization or action based on variables and characteristics.

    Details

    Delivery method

    Pricing

    Custom pricing options

    Pricing is based on your specific requirements and eligibility. To get a custom quote for your needs, request a private offer.

    How can we make this page better?

    We'd like to hear your feedback and ideas on how to improve this page.
    We'd like to hear your feedback and ideas on how to improve this page.

    Legal

    Content disclaimer

    Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.

    Support

    Vendor support

    Contact Information: