How does Closed Source Intel Work?

Updated 3 months ago by Shimon Modi

Introduction

Closed source intelligence require credentials and keys for setup and configuration. You can find the list of closed source intelligence sources here.

The following sources will only return results if you submit data into your enclave. Unlike open source intelligence we do not poll these services if there are no reports in your enclave to enrich. These data sources are actively queried for information based on intelligence submitted into your enclave. 

  • AlienVault OTX
  • CrowdStrike Falcon Intelligence
  • Facebook Threat Exchange
  • Hybrid Analysis
  • IBM X-Force
  • VirusTotal

How Did We Do?