Cyber Threat Alliance - Analytic Sharing: Difference between revisions
From GCA ACT
Jump to navigationJump to search
(Updated description via script) Tag: Reverted |
(Updated via script) Tag: Manual revert |
||
Line 1: | Line 1: | ||
=Description=<br> | =Description= | ||
<br> | |||
The Cyber Threat Alliance (CTA) is a non-profit membership organization whose mission is to improve the world's response to cyber threats. CTA members include some of the most respected cybersecurity companies in the world. | The Cyber Threat Alliance (CTA) is a non-profit membership organization whose mission is to improve the world's response to cyber threats. CTA members include some of the most respected cybersecurity companies in the world. | ||
The CTA's flagship product is Analytic Sharing, a cloud-based platform that allows member companies to share cyber threat intelligence in real-time. Analytic Sharing is powered by a unique, patent-pending technology called ThreatGraph.=More Information= | The CTA's flagship product is Analytic Sharing, a cloud-based platform that allows member companies to share cyber threat intelligence in real-time. Analytic Sharing is powered by a unique, patent-pending technology called ThreatGraph. ThreatGraph analyzes millions | ||
<br> | |||
=More Information= | |||
<br> | <br> | ||
https://cyberthreatalliance.org | https://cyberthreatalliance.org | ||
[[Category:Cybersecurity Providers]] | [[Category:Cybersecurity Providers]] | ||
[[Category:Security Operations Entities]] | [[Category:Security Operations Entities]] |
Latest revision as of 05:01, 23 April 2024
Description
The Cyber Threat Alliance (CTA) is a non-profit membership organization whose mission is to improve the world's response to cyber threats. CTA members include some of the most respected cybersecurity companies in the world.
The CTA's flagship product is Analytic Sharing, a cloud-based platform that allows member companies to share cyber threat intelligence in real-time. Analytic Sharing is powered by a unique, patent-pending technology called ThreatGraph. ThreatGraph analyzes millions