top of page

CUSTOMER PORTAL

THREATS
Data on the total number of threats received and analyzed by CTIQ, as well as threats that have failed. Failures typically refer to threats that do not match a client’s technology profile or are not IT- and cybersecurity-related. The reports break down the number of threats by source: application programming interfaces (APIs), email, and Really Simple Syndication (RSS) feeds.

DARK WEB MONITORING
CTIQ monitors the dark web for information about an organization’s executive leadership, intellectual property, email address and password combinations, and stealer logs.

REMEDIATION PLAYBOOKS
CTIQ turns CTI into action via remediation playbooks. For each threat that the platform identifies, we provide a custom playbook that includes the risk priority (urgent, critical, high, or medium) and detailed remediation steps.

TECHNOLOGY PROFILE
CTIQ uses LANSweeper to develop a complete inventory of each customer’s hardware and software assets. Our proprietary AI algorithm uses this technology profile to filter CTI and provide relevant alerts only, saving cyber analysts from alert fatigue.


SUBSCRIPTION OPTIONS
CTIQ’s mission is to provide data and insights that enterprises can use to combat threats and improve their cybersecurity profiles. This means eliminating noise and providing alerts that are manageable in frequency and quantity.
In the portal, CTIQ customers can configure:
-
Alert frequency (daily, weekly, or monthly), excluding zero-day threats. CTIQ immediately notifies every customer when a zero-day threat is discovered, as long as it applies to one or more technologies in their environment.
-
Threat risk levels (urgent, critical, high, and/or medium) included in their email notifications. This avoids undue strain on security resources and teams.
-
Geofencing. The geofencing option allows analysts to proactively monitor specific geographic locations for threat activity.
bottom of page