R-Vision Threat Intelligence Platform
Offer a reference bonus
1.00

R-Vision Threat Intelligence Platform

R-Vision

-
-
ROI-
USD
Using8
Selling14

PitchR-Vision Threat Intelligence Platform is a dedicated platform for cyber intelligence data management.

Product features

Description

The product provides automatic collection, normalization and enrichment of indicators of compromise, transmission of processed data directly to internal defenses, and search and detection of indicators in the internal infrastructure of the organization using sensors.

ADVANTAGES

  • Simplifies working with TI data by continuously collecting, normalizing and storing data
    from various sources in a single database.
  • Allows you to block threats in time and minimize possible damage,
    Thanks to the automatic upload of processed data directly to the information security system.
  • Accelerates investigation by quickly finding information in available tools
    key scenarios.
  • It makes it easier to identify hidden threats, uses automatic monitoring of relevant indicators in SIEM using sensors.
Centralized Collection and Processing of TI data
R-Vision Threat Intelligence Platform collects threat intelligence data from multiple sources and performs their manual or automated processing and prioritization.
Indicators of compromise can be gathered manually using advanced search algorythms or automatically via API. Data Enrichment
R-Vision TIP performs additional checks for specific indicators of compromise and enriches data with the necessary context through additional enquiries into the external systems and other available information. Data Output to Internal Security Systems
R-Vision Threat Intelligence Platform provides a single point of threat intelligence data collection, analysis and processing. Processed data can be automatically sent to internal security controls, thereby reducing false positives and is delivered to other systems for further use. Integration with R-Vision Incident Response Platform
Tight integration with R-Vision IRP enables the immediate use of threat intelligence for incident response and investigation. The system automatically searches for threats which are relevant to the specific IT infrastructure controlled by R-Vision IRP. It also checks indicators which have been revealed during incident response in all available feeds, automatically or upon request. TI Data Exchange
Built-in tools for information sharing allow real-time data exchange with peer R-Vision TIP users, trusted partners, external experts, communities and public CERTs with full control over information volume and recipients facilitating early threat detection."

Problems that the product solves

Decentralized IT systems

High costs of IT personnel

Risk or Leaks of confidential information

Risk of attacks by hackers

Risk of data loss or damage

Values

Enhance Staff Productivity

Manage Risks

Testing

https://rvision.pro/en/ Contact: sales@softprom.com

Characteristics (Threat Intelligence Platforms)

Own feed providers / feed prep analytics centers

N/A

Normalization, feed deduplication

Avaliable

Number of feed suppliers out of the box

20-100

CSV files

Avaliable

JSON files

Avaliable

HTTP-feed

Avaliable

Email

N/A

STIX / TAXII Standards Support

Avaliable

Unstructured text data

N/A

The ability to enrich data from external sources (for example, WHOis, PassiveDNS, VirusTotal, etc.)

Avaliable

Connecting additional feed providers

Avaliable

Search for matches in SIEM events

Avaliable

Direct incident response through integration with third-party information security systems

Avaliable

Responding to incidents using complex algorithms (playbooks)

N/A

REST API Integration Capability

Avaliable

Manual adjustment of “weight” parameters for feed’s

N/A

Ability to build a graph of links between feed’s objects and internal artifacts

N/A

Transaction Features

Partner average discount

Deal protection

Average deal size

Average deal closing time

Scheme of work

 Scheme of work

Competitive products

User features

Roles of Interested Employees

Chief Information Officer

Chief IT Security Officer

IT Security and Risk Management

Organizational Features

IT Security Department in company