Threat actor or Group attribution and TTP analysis.
Threat Intelligence driven Risk assessments.
Threat Intelligence analyst augmentation using multiple sources and tools.
Malware analysis – Static or Dynamic limited reversing
Malicious Infrastructure analysis
Underground engagements and monitoring
Enrichment from Telemetry and previous Trellix reporting
Tailored Threat briefings
Social network analysis.
Ability to understand and isolate high impact events like network or customer compromises.
Customer-specific threat intelligence
The team works with customers on a disciplined intelligence exploitation cycle to develop and prioritize their intelligence objectives and requirements, and delivers reporting in a custom form factor defined by the customer.
Our INTaaS service can scale as an extension of your team from a small set of threat intelligence requests up to a larger retainer model with an option for a physical analyst on site if needed.
Industry leaders in Analysis
Custom intelligence reporting.
Analysis of samples, domains or IP addresses.
TIG analysts can be deployed anywhere on the globe to provide onsite support to our customer set.
Worldwide situational awareness
Trellix intelligence analysts have full scope visibility into a multi sourced malicious activity picture.
Take the next step toward living threat intelligence