ZeroFox Expands Threat Intelligence Capabilities with Exclusive Visibility into External Threats

ZeroFox’s comprehensive set of intelligence feeds is now available to enhance alert context and prioritize remediation efforts for fraud, identity, network and dark web underground intelligence

ZeroFox, a leading external cybersecurity provider, today announced the general availability of a comprehensive set of intelligence feeds. Organizations are facing a significant rise in the frequency and sophistication of cyberattacks, with 63% of organizations breached in the last year. Access to relevant and timely threat intelligence data is critical to strengthen protection, visibility and situational awareness. According to the 2022 CTI survey report by SANS Institute, security teams are looking for relevant and actionable intelligence around vulnerabilities, threat actors, as well as for tactics, techniques, and procedures (TTPs), and trends in the criminal underground. ZeroFox is now making its threat intelligence data more accessible than ever by offering customers multiple ways to operationalize the intelligence to defend against ransomware, phishing, fraud, credential theft and vulnerabilities.

Marketing Technology News:Digsite Launches New Tech for Rapid Research Exploration

Recognized as “best in class for brand threat intelligence use cases and takedown service,” in The Forrester Wave™: External Threat Intelligence Services, Q1 2021, ZeroFox now offers a comprehensive threat intelligence solution to customers where, when, and how they need it:

  • Finished intelligence such as reports and advisories curated using extensive intelligence tradecraft by a global team of intelligence analysts, empowering security leaders to stay ahead of trends and make critical strategic decisions
  • Relevant, timely alerts based on AI and human intelligence analysis of global intelligence collection that are focused on customers’ priority intelligence requirements around brands, domains, executives, locations and attack surface systems
  • Intelligence search in the ZeroFox platform to enable extensive research and correlation of potential and ongoing threats in the intelligence data lake
  • Intelligence feeds that provide API access to enrich the SOC security stack for deeper context and automated, more accurate response to threats

Today’s announcement follows a series of intelligence investments, including the acquisition of Cyveillance and Vigilante. It is also in conjunction with the company’s plans to acquire IDX and become a publicly-traded company via a merger with L&F Acquisition Corp under the ticker symbol ZFOX.

“It is critical for security teams to not only take steps to continuously monitor and identify threats across their organizations’ digital attack surface but also to use real-time contextual analysis and automation to recognize, disrupt, and remediate threats,” said AJ Nash, Vice President of Intelligence, ZeroFox. “Our 2022 Threat Intelligence Forecast predicts that organizations across sectors will remain at heightened risk of attacks further into the year. As such, the introduction of our expanded capabilities, including Intelligence Search and Threat Intelligence Feeds allows organizations of all sizes to protect their data, facilities, people, and customers.“

Marketing Technology News: Five Tips for Building a Strong Customer Community in 2022

ZeroFox combines all facets of threat research – raw data, curated information from world-class analysts and finished intelligence – to provide insight that prevents and speeds response to emerging attacks. With global intelligence collection across external data sources, a rich history in digital risk protection, and a multi-lingual team of experienced research analysts exclusively focused on the Dark Web, ZeroFox delivers intelligence value and an unrivaled understanding of the threat landscape. This external intelligence enriches threat correlation with other sources for more accurate prioritization and automation of mitigation. It results in intelligence that is easier to consume and understand so that security teams can quickly take meaningful action.

ZeroFox’s broad range of Threat Intelligence Feeds keep threat alerts relevant and remediation efforts prioritized and coordinated across all cybersecurity functions. In addition to our exclusive disruption feed which provides access to documented domain, mobile app store, digital platform and social media account impersonations which have been requested for takedown, our feeds deliver expansive intelligence from millions of surface, deep and dark web sources such as difficult-to-obtain compromised credentials, malware, ransomware, exploits, vulnerabilities, C2 domains, and dark web artifacts, and discord, IRC and Telegram chatter. The new intelligence feed bundles are purpose-made to solve specific categories of real-world problems. Areas of focus include:

  • Identity and Fraud Intelligence feeds that integrate with access management and account database tools to prevent fraud and secure identities, logins, and Personally Identifiable Information (PII)
  • Network and Vulnerability Intelligence feeds work with firewalls, XDR and SOAR platforms to inform incident response, prioritize vulnerabilities, and improve network security
  • Covert Communications Intelligence feeds are accessed through Threat Intelligence Platforms (TIPs), SIEMs and Threat News Feeds to provide insights and early warnings into chatter related to malicious activity and data breach packages on the deep and dark web

ZeroFox’s threat intelligence solutions provide security teams with timely, relevant and action-oriented intelligence to understand the external attack surface and disrupt adversaries. The addition of Threat Intelligence Feeds extends that unique external threat intelligence to the broader security tech stack.

Marketing Technology News:MarTech Interview with Chris Gladwin, CEO and Co-founder at Ocient

Brought to you by
For Sales, write to: contact@martechseries.com
Copyright © 2024 MarTech Series. All Rights Reserved.Privacy Policy
To repurpose or use any of the content or material on this and our sister sites, explicit written permission needs to be sought.