ESET’s threat intelligence services extend an organizations’ security intelligence


ESET has launched its threat intelligence services, designed to extend an organizations’ security intelligence. These new commercially available reports provide deeper insights and actionable guidance from ESET’s renowned global research teams about specific threat vectors and attack sources.

Now corporations and government entities of all sizes, as well as managed service providers (MSPs) and other channel partners, can make critical decisions faster, giving them a strategic advantage and competitive edge in the fight against cybercrime.

“The value of curated, high-quality threat intelligence lies in cutting through information overload to proactively deliver relevant guidance on potential threats that matter to the organization,” said Tony Anscombe, chief security evangelist at ESET.

“Rather than struggling to sift through huge, noncurated external datasets, or working with limited publicly available data, ESET’s customizable threat intelligence services enable security teams to quickly identify and prioritize emerging business risks and incoming threats – and provide the information necessary to implement a more proactive cybersecurity posture. These services also accelerate incident response and reduce data breach impacts by giving a more complete picture of the threat actor, vectors, indicators of compromise, and malware behavior,” Anscombe continued.

The new offerings include:

  • ESET Advanced Persistent Threat (APT) Reports share ESET’s ongoing APT research, including activity summaries. The APT Reports PREMIUM package gives customers access to an ESET analyst for up to four hours each month, a perfect way to get in-depth guidance on critical issues. These private reports assemble curated data for organizations that support efficiency, process maturity and security audits.
  • ESET Threat Intelligence Feeds give customers a real-time view of the worldwide threat landscape based on feeds from our research centers, to enable security teams to quickly act on IoCs in their environment. Available feeds (JSON or STIX 2.0 format) include malicious files, malicious domains, botnets, malicious IPs, malicious URLs, and APT information (included with the APT…

Source…