[In the Know] Understanding Threater Collect


Threater’s Collect is a free intelligence aggregation solution to give you a full view of your threat intelligence feeds and lists. By aggregating this information, it can then be fed to the rest of the security stack tools for a widened view of the threat landscape. 

Cyber intelligence is the beating heart of cybersecurity. It informs everything, from the tools to the team to the processes themselves. It’s not a secret that the wider your view of the threat landscape, the better you can defend your network. 

Cyber intelligence comes from a variety of sources: government, commercial platforms, and open source are a few of them. However, in order to make the intelligence usable, it needs to be centralized in one place. This is where Collect comes in: it’s line speed intelligence aggregation available to anyone at no cost

Collect’s intelligence aggregation powers are what give Enforce the intelligence to block threats. In order to help you understand what Collect does, we made this quick video tour. 

Centralize Your Cyber Intelligence 

Collect streamlines the process of managing cyber intelligence by bringing all your data together in one place. Whether you’re tapping into industry-specific cyber intelligence feeds, managing your own lists, or integrating other external sources, Collect ensures all your lists are accessible and at your fingertips.

Quick Onboarding and Intuitive Interface:

Getting started with Collect is a breeze. Simply visit our Collect page, sign up for a free account, and you’re in. Once inside, you’ll find a user-friendly interface that provides real-time insights into your aggregated intelligence. This is a central view of all your intelligence feeds, lists, and sources.

View Intelligence Coverage with Intelligence Overlap Matrix:

Our List Overlap Matrix gives you a visual snapshot of how your intelligence lists intersect. The higher the numbers in the matrix, the more overlap of indicators there are. It’s extremely rare to have much overlap, which highlights the importance of a wide, varied view of the threat landscape to inform your tools and feeds. 

Flexible List Creation and Export Options:

Having intelligence is good, but what you do with them is what matters. Collect can export your lists in CSV or JSON formats, ensuring compatibility with your existing security tools. These aggregated indicators can help inform blocking decisions from other tools such as the firewall. 

Marketplace for Premium Intelligence Feeds:

Whether you need additional industry-specific feeds or want more intelligence feeds, our integrated Marketplace is available for you and can hook into Collect straight from the platform. 

Upgrade to Threater Enforce for Enhanced Protection:

Ready to take your cybersecurity to the next level? Consider upgrading to Threater Enforce. With Collect as your foundation, you can not only aggregate intelligence but also enforce and respond to known threats effectively. 

This automated block/allow mechanism is informed by Collect’s intelligence aggregation and performed at line speed, blocking all traffic to and from known threat actors on every port and protocol. If you decide to upgrade to Enforce from Collect, this can also be completed within the portal. 

Get Started Today with Collect:

If you’re ready to get started with free intelligence aggregation, you can sign up for a free Collect account today and start bolstering your cybersecurity defenses. Whether you’re a small business on a tight security budget or a large enterprise looking for a way to manage your threat intelligence, Collect gives you the power of the cyber intelligence community, for free.