<img src="https://ws.zoominfo.com/pixel/cEO5AncHScwpt6EaX0mY" width="1" height="1" style="display: none;">
MC-Mission Center Logo

A secure portal-based solution where companies can collaborate and share cyber threat information to improve situational awareness and facilitate proactive cyber defense.

MC-Wavy Line

What problems does Mission Center solve?

MC-Secure Sharing

Need for secure cyber threat sharing among a community in an environment that can build trust relationships to facilitate successful threat intel sharing.

MC-Distills

Need for functionality that promotes sharing + correlates and distills information to match stated preferences, combined with effective delivery mechanisms so the content in the system will be regarded as relevant and actionable.

MC-Automate

Need for tools to automate inbound and outbound threat data to/from a central repository and the collaboration tools members use.

MC-Communication

Need for out-of-band communication channel in the event of a breach or network outage.

MC-Repository

Need for a secure central repository to store highly sensitive cyber threat intelligence or other documents (e.g., CUI data).

Request a Demo

Who Uses Mission Center?

MC-Enterprise

Enterprise
Companies

MC-Government

U.S. Government
Agencies

MC-ISAC

ISACs / ISAOs

What does Mission Center do?

MC-Collaboration

CENTRALIZED COLLABORATION MANAGEMENT

Receive shared community information to a centralized management place for augmentation and redistribution to all or parts of the community.

Secure document repository with approval workflow, custom permissions and more for secure document storage. Segment user membership into secure compartments where the data is also segmented to support closed-door communities, working groups, and more

MC-Discussion

FACILITATE
DISCUSSIONS & COLLABORATION

Crowdsource cyber threat discussions to build collective understanding of a threat.

The threaded discussions tool provides a place to share threats and IOCs (indicators of compromise).

Community discussions to facilitate crowdsourcing with the following abilities:

  • Organization into categories based on topic.
  • IOC extraction to summarize threats for an analyst
  • Contextualize threat reports
  • Uses TLP
  • Provide community with premium chat offering.
  • Dashboards to drive community engagement.
MC-Extraction

CYBER
THREAT
EXTRACTION

Programmatic extraction of cyber threat intelligence to help build a coherent package of intelligence that is contextualized. Then, make it available in technical and non-technical means to members of the community.

  • API access to extract threats from discussions.
  • Direct integration with MISP and Splunk
  • Or leverage Celerium’s threat intel routing capability to streamline the process.

Highly configurable
system

  • Customize to meet specific needs.
  • Admins have centralized control over org/user/role management.

Emphasis on
security

  • TOTP Authentication 
  • Permissions-based access
  • Compartmentalized information to control access and share on a need-to-know basis
  • Token-based API authentication
  • Meets NIST 800-53 medium

Dedicated
support

Dedicated customer success manager to help customize your system and help you get the most out of the tool.

  • 24x7 technical support available
Request a Demo