Collaboration

Empowering humans to share experiences on cyber threats.

Practitioner Collaboration

Analysts. Managers. CISOs.

How does your team collaborate on cyber threat intelligence? Do they send emails (which aren’t secure) or play phone tag (which is inefficient)?

Our collaboration tools give your team a secure communication portal to discuss cyber threat intelligence and other cyber security concerns. By using threaded discussions, it’s easy to stay organized and to go back and see the conversation history.

Even better, capture structured data and with one click push that data into your repository for easy defensive action. As your team discusses threats, the system suggests pieces of intelligence that may be related, allowing your team to make connections and discoveries even faster, making your cyber defense even more effective.

Ready to see it in action? Schedule a demo today.

Benefits_Icon

Benefits

• Granular and discreet access controls 

Essential handling mechanisms like Traffic Light Protocol (TLP)

Highly flexible organizational controls for sharing and auditing

Fully secure, redundant physical data centers built to federal, intelligence community standards

Meets or exceeds NIST 800-53 guidance requirements 

Federated Identity Management expertise

Collaboration through blogs, wikis, message boards, chat and more

 Standards-based third-party application support, including JSR 168, KML, CAP, and JBPM standards

Configurable Solutions

Proactive Defense

Which solutions will empower your cyber threat intelligence program?

Community_1

Community Cyber Defense

A unique mechanism that makes the community of members more cyber secure.

Portal-midblue

Cyber Defense Collaboration

A secure communication portal to discuss cyber threat intelligence and other cyber security concerns.

Automated

Machine-to-Machine Threat Sharing

A threat router utilizing STIX/TAXII, giving you one place to receive all your cyber threat intelligence from all your sources.