• Product keyboard_arrow_down
  • Solutions keyboard_arrow_down
  • Customers
  • Partners
  • Blog
  • Resources keyboard_arrow_down
  • Get started arrow_forward
  • Login vpn_key
  • Product
  • apps
    Overview
    Learn more about threat intelligence powered by machine learning
  • blur_on
    Technology
    See how collection from an unrivaled breadth of sources powers risk insights
  • developer_board
    Integrations
    Combine threat intelligence with your existing security technology
  • announcement
    Services
    Let our team of world-class analysts help you apply threat intelligence
  • device_hub
    API
    Connect to our real-time threat data through a flexible rest API
  • create
    Training
    Become an expert in threat intelligence through our educational programs
  • Solutions
    people By Role
  • Incident Response
  • Security Leadership
  • Security Operations
  • Threat Analysis
  • Vulnerability Management
  • extension By Need
  • Brand Monitoring
  • Dark Web Monitoring
  • Indicator Enrichment
  • Threat Hunting
  • Threat Intelligence Platform
  • Threat Intelligence Feeds
  • business By Industry
  • Energy
  • Financial Services
  • Government
  • Healthcare
  • Retail
  • Resources
  • email
    Cyber Daily
    Join over 35,000 subscribers who get daily threat insights by email
  • mic
    Podcasts
    Listen to our podcast to supercharge your threat intelligence knowledge
  • ondemand_video
    Webinars
    Watch live and on-demand webinars to hear from industry experts
  • chrome_reader_mode
    White Papers
    Read our white papers to keep up with the latest threat intelligence advice
  • menu
    close
    • Product
      • Overview
      • Technology
      • Integrations
      • Services
      • API
      • Training
    • Solutions
      • Threat Analysis
      • Security Operations
      • Incident Response
      • Vulnerability Management
      • Security Leadership
      • Indicator Enrichment
      • Brand Monitoring
      • Threat Hunting
      • Cyber Risk Trends
      • Threat Intelligence Feeds
      • Financial Services
      • Healthcare
      • Retail
      • Energy
      • Government
    • Customers
    • Partners
    • Resources
      • Cyber Daily
      • Webinars
      • Podcasts
      • White Papers
    • Login
    Integrating Threat Intelligence Into Security
    Recorded Future Blog

    Integrating Threat Intelligence Into Security

    By Ashleigh Erturk on April 16, 2018

    Introducing Recorded Future’s New Technology Partner Program: Recorded Future Connect Xchange

    Security teams across the organization are faced with challenging questions: Which alerts represent real threats? How do I prioritize patching after a vulnerability scan? What external threats are targeting my organization? What is the extent of an incident and what was the goal?

    Internal context and manual research provide some insights, but it’s not enough to make the fastest, most effective decisions.

    That’s why Recorded Future has launched Recorded Future Connect Xchange, a technology integration program designed to provide access to rich threat intelligence directly in the security solutions teams are already using. Inaugural partners include: Brinqa, Cofense (formerly known as PhishMe), DFLabs, DomainTools, EclecticIQ, Farsight Security, IBM QRadar, IBM Resilient, LogRhythm, Palo Alto Networks, ProtectWise, ReversingLabs, Tenable®, ThreatConnect, and Versive.

    Connect Xchange (Connect X) makes it easier for security teams to proactively map threats applicable to their organizations, and add dynamic, real-time intelligence to traditionally static security functions by providing:

    • Direct access to threat intelligence where you need it.
    • Customized risk lists for correlations.
    • External intelligence combined with internal data.
    • Seamless integrations.

    Read more about the program in our recent press release.

    Interested in becoming a Connect X partner? Apply to the program now.

    Up next:
    7 of the Top 10 Vulnerabilities Target Microsoft

    In this episode, our experts discuss the findings from our recent vulnerability research and explain how organizations can use this information for planning their defenses.

    Company
    1 week AGO
    Ashleigh Erturk
    Cyber Daily Banner
    listRecent Posts
    • CVSS Scores: A Useful Guide

      By The Recorded Future Team

      on April 24, 2018

    • The Importance of Adversarial Focus

      By Amanda McKeon

      on April 23, 2018

    • The Science and Art of File Reputation

      By The Recorded Future Team

      on April 19, 2018

    • Fusion Use Case: Internal Threat Reporting

      By Karen Kiffney

      on April 18, 2018

    • The Increasing Affordability of Crimeware as a Service

      By The Recorded Future Team

      on April 17, 2018

    Copyright © 2018 Recorded Future, INC.
    Product
  • Overview
  • Technology
  • Integrations
  • Services
  • API
  • Resources
  • Blog
  • Cyber Daily
  • Podcasts
  • Webinars
  • White Papers
  • Company
  • About
  • Events
  • Press
  • Contact
  • Jobs
  • Information
  • Support
  • FAQ
  • Terms
  • Privacy
  • Cookies
  • Copyright © 2018 Recorded Future, INC.
    closeclose