ThreatBook is a provider of cyber threat detection and response services. We developed new approaches to deliver high-fidelity, efficient, and actionable security intelligence. We integrated these capabilities with a full life cycle threat detection system and incident response mechanisms to enhance protection across cloud, network, and endpoints. This helps enterprises respond to threats efficiently, reduce complexity, and improve security operations.
Do You Manage Peer Insights at ThreatBook?
Access Vendor Portal to update and manage your profile.
First,I appreciate TDP's detection capability and high level of accuracy.In most cases,if TDP generates a detection alert,there is indeed a real issue,and false positives are very rare.In daily operations,I mainly focus on alerts related to successful attacks.Second,I value the response efficiency of ThreatBook. Whenvever I report an issue,the ThreaBook team responds very quickly and handles the problem thoroughly.They also regularly organize technical sharing sessions,which help me learn about new attack scenarios and security technologies.
TDP provides alert notification capabilities, allowing real-time detected alerts to be sent directly to enterprise bots for immediate notification.It also includes attack surface management features, such as identifying weak passwords and exposed external login portals, helping organizations verify and remediate risks in a timely manner.In addition, TDP Supports automated response capabilities by integrating with other security devices to block malicious IPs and domains, enabling a largely automated incident response and security operations workflow.
1) We have a large number of equipment units, after deploying in a cluster, we can conduct unified operation and maintenance monitoring,which saves a lot of operational time. 2) The TDP has a real-time monitoring interface, during our attack and defense phases, we can use this to achieve real-time refreshing of attack data.
I think the TDP API documentation is not comprehensive enough,as it does not include all the fields displayed on the web interface.In addition,some weak password detection results are not entirely accurate.
In terms of weak password detection, some normal authenticated login behaviors are occasionally identified as weak password events, resulting in inaccurate detection in certain scenarios. Second, the built-in agent used for investigation and tracing collects limited information, so its investigation capabilities are somewhat restricted. The overall product cost is relatively high compared to some other solutions.
1) The cascading deployment requires a relatively high amount of resources, so we are considering that the cost application process is rather cumbersome. 2) The equipment cannot connect to the internet, so the intelligence needs to be manually updated every day. However, there is nothing we can do about it.