Threat intelligence information is gathered from numerous internal and external globally leading sources, both commercial and open source. Thanks to this information, harmful behavior can be detected faster – for example connections to or from suspicious IPs of the internal IT infrastructure.

Apart from the IP addresses with bad reputation, this information includes URLs with the same characteristics, e-mail addresses used for phishing, and file names, file paths and user agents used for malware.

The security-relevant data extensively collected and processed by Radar Cyber Security in combination with the comprehensive threat intelligence information from various sources allow Radar Cyber Security to be exceptionally fast when it comes to detection & response.