Laptop Displaying the GigaOm Research Portal

Get your Free GigaOm account today.

Access complimentary GigaOm content by signing up for a FREE GigaOm account today — or upgrade to premium for full access to the GigaOm research catalog. Join now and uncover what you’ve been missing!

GigaOm Radar for Threat Intelligence Solutionsv1.01

Table of Contents

  1. Summary
  2. Market Categories and Deployment Types
  3. Key Criteria Comparison
  4. GigaOm Radar
  5. Vendor Insights
  6. Analyst’s Take
  7. About Brenton Bowen

1. Summary

Risk-based cyber defense strategies and secure infrastructures require validated and actionable threat intelligence (TI). The adoption of intelligence-based approaches for enterprise security operations and risk management has grown steadily as the threat landscape and the amount of data required to implement an intelligence-led cybersecurity framework has increased year over year. The threat intelligence lifecycle is a big data and data analytics problem. This is especially true for threat intelligence platforms (TIPs) that are casting a wide net to collect billions of data points, all of which must be fed through their threat intelligence pipelines.

In general, there are two approaches to threat intelligence solutioning, though both share the same goal: to help organizations protect their environments, endpoints, and assets from known or emerging cyber threats. TIPs will correlate logs and telemetry data against the database of threat data and information, while TI providers take a more focused approach by scoping the collection and correlation through queries or client-specific threat intelligence programs. The decision whether to implement a TIP or a TI provider will come down to the specific requirements and the use case of the organization. As an example, security operations and vulnerability management will see a short time to value from the broader collection and correlation of a TIP, and threat hunters will see immediate value from the reduced scope and the more precise querying ability delivered by Tl providers.

Threat intelligence is still an evolving space. While the belt that has historically restricted security organizations has loosened, many security teams remain overwhelmed and face burn out. This issue is exacerbated when their existing threat intelligence solution is inadequate—causing security teams to waste hours investigating unreliable data and noise.

Digital transformation and the increasing number of remote and hybrid workers have drastically changed the way security professionals work. To optimize their approach to detection and response, security professionals must implement proactive strategies in place of reactionary ones. Even the best reactionary strategies are inadequate when attempting to stop mid-level adversaries.

Knowing the tactics, techniques, or procedures (TTPs) of your organization’s threats can help you plan, test, and engineer effective detections and responses before an incident. Put more simply, proactive intelligence-based threat strategies accelerate the effectiveness and reactiveness of your threat defense and incident response organizations.

This GigaOm Radar report highlights key threat intelligence vendors and equips IT decision-makers with the information needed to select the best fit for their business and use case requirements. In the corresponding GigaOm report “Key Criteria for Evaluating Threat Intelligence Solutions,” we describe in more detail the key features and metrics that are used to evaluate vendors in this market.

How to Read this Report

This GigaOm report is one of a series of documents that helps IT organizations assess competing solutions in the context of well-defined features and criteria. For a fuller understanding, consider reviewing the following reports:

Key Criteria report: A detailed market sector analysis that assesses the impact that key product features and criteria have on top-line solution characteristics—such as scalability, performance, and TCO—that drive purchase decisions.

GigaOm Radar report: A forward-looking analysis that plots the relative value and progression of vendor solutions along multiple axes based on strategy and execution. The Radar report includes a breakdown of each vendor’s offering in the sector.

Solution Profile: An in-depth vendor analysis that builds on the framework developed in the Key Criteria and Radar reports to assess a company’s engagement within a technology sector. This analysis includes forward-looking guidance around both strategy and product.