{"id":5105,"date":"2017-02-06T20:30:14","date_gmt":"2017-02-06T20:30:14","guid":{"rendered":"http:\/\/staging.nsfocusglobal.com\/?p=4253"},"modified":"2017-02-06T20:30:14","modified_gmt":"2017-02-06T20:30:14","slug":"threat-intelligence-youre-purchasing-process","status":"publish","type":"post","link":"https:\/\/nsfocusglobal.com\/pt-br\/threat-intelligence-youre-purchasing-process\/","title":{"rendered":"Threat Intelligence \u2013 You\u2019re Purchasing the Process"},"content":{"rendered":"<p><em><strong>By:\u00a0Stephen Gates, Chief Research Intelligence Analyst, NSFOCUS<\/strong><\/em><\/p>\n<p>Over the past year, the cyber security industry has changed significantly in the light of an innovative tool called \u201cThreat Intelligence\u201d (TI). Organizations of all sizes are beginning to gain understanding of the value of TI; however, there is some confusion concerning what organizations believe they are receiving for their money. Organizations are beginning to learn about the notions of strategic and tactical TI. One provides longer-term, pragmatic analysis, alerts, and reports; while the other provides short-term, more-actionable data and informational feeds. Both have tremendous value to organizations who want to gain more insight into the cyber-threat landscape they face daily. However, is TI more than just data?<!--more--><\/p>\n<p>When organizations decide to purchase commercial TI, what are they clearly buying? Most have yet to recognize the fact that they are essentially buying a \u201cprocess\u201d; which surpasses the undesirable perception of just more data. Organizations of any size have the option to hire researchers, analysts, and report writers; while at the same time deploying sensors, honeypots, and end-point visibility, that covers a part of the world they\u2019re most interested in. The prospect of building and running a team of researchers, while at the same time deploying a data collection framework is a complete reality \u2013 albeit a rather expensive one.<\/p>\n<p>Most organizations are not prepared to spend huge sums of money on this proposition. Instead, most organizations have decided to allow the experts to do what they do best, and purchase the commercial TI they\u2019re looking for. In this case, organizations have decided to purchase a process, instead of trying to spin-up that process themselves. This allows organizations of all sizes to capitalize on TI. It also helps reduce costs for any single entity, by ideally spreading these costs across many buyers; keeping them as low as possible, while providing the highest quality and value. This decision makes the absolute best sense.<\/p>\n<p>The process organizations are buying is called the \u201cthreat intelligence lifecycle\u201d, and in most cases, it\u2019s a well-defined process. It begins by collecting data from multiple sources. These sources include researchers (humans), in addition to sensors, honeypots, and endpoint visibility tools (technology). It next consumes the collected data and applies a process of translation, collation, evaluation, and finally curation of the data points. Next the data is deeply analyzed to determine its value and significance; while developing recommended actions and next-steps.<\/p>\n<p>Then, the data in the form of strategic and tactical information is packaged and delivered via blogs, alerts, reports and data feeds. The final step involves a closed-loop feedback system to determine the success of the information, and then the process is adjusted as needed. The activity is continually repeated, and the constant flow of actionable threat intelligence is provided as part of the service.<\/p>\n<p>As one can see, threat intelligence is more than just static or transitional data. It involves well-defined processes, with sets of deliverables. Therefore, organizations who take advantage of commercial TI are gaining the true value through a process the vendor delivers, and not only from the data itself. This is what organizations are \u201creally\u201d buying, when they purchase commercial TI.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>By:\u00a0Stephen Gates, Chief Research Intelligence Analyst, NSFOCUS Over the past year, the cyber security industry has changed significantly in the light of an innovative tool called \u201cThreat Intelligence\u201d (TI). Organizations of all sizes are beginning to gain understanding of the value of TI; however, there is some confusion concerning what organizations believe they are receiving [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":26424,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"categories":[3,20],"tags":[],"class_list":["post-5105","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","category-uncategorized"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Threat Intelligence \u2013 You\u2019re Purchasing the Process - NSFOCUS<\/title>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Threat Intelligence \u2013 You\u2019re Purchasing the Process - NSFOCUS\" \/>\n<meta property=\"og:description\" content=\"By:\u00a0Stephen Gates, Chief Research Intelligence Analyst, NSFOCUS Over the past year, the cyber security industry has changed significantly in the light of\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nsfocusglobal.com\/threat-intelligence-youre-purchasing-process\/\" \/>\n<meta property=\"og:site_name\" content=\"NSFOCUS\" \/>\n<meta property=\"article:published_time\" content=\"2017-02-06T20:30:14+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/09\/1-6.png\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Threat Intelligence \u2013 You\u2019re Purchasing the Process - NSFOCUS\" \/>\n<meta name=\"twitter:description\" content=\"By:\u00a0Stephen Gates, Chief Research Intelligence Analyst, NSFOCUS Over the past year, the cyber security industry has changed significantly in the light of\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/09\/1-6.png\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/threat-intelligence-youre-purchasing-process\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/threat-intelligence-youre-purchasing-process\\\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\"},\"headline\":\"Threat Intelligence \u2013 You\u2019re Purchasing the Process\",\"datePublished\":\"2017-02-06T20:30:14+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/threat-intelligence-youre-purchasing-process\\\/\"},\"wordCount\":534,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/threat-intelligence-youre-purchasing-process\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/1-6.png\",\"articleSection\":[\"Blog\",\"Uncategorized\"],\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/threat-intelligence-youre-purchasing-process\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/threat-intelligence-youre-purchasing-process\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/threat-intelligence-youre-purchasing-process\\\/\",\"name\":\"Threat Intelligence \u2013 You\u2019re Purchasing the Process - NSFOCUS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/threat-intelligence-youre-purchasing-process\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/threat-intelligence-youre-purchasing-process\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/1-6.png\",\"datePublished\":\"2017-02-06T20:30:14+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/threat-intelligence-youre-purchasing-process\\\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/threat-intelligence-youre-purchasing-process\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/threat-intelligence-youre-purchasing-process\\\/#primaryimage\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/1-6.png\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/1-6.png\",\"width\":1048,\"height\":535,\"caption\":\"SSL Certificate Replacement settings interface screenshot.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/threat-intelligence-youre-purchasing-process\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/nsfocusglobal.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Threat Intelligence \u2013 You\u2019re Purchasing the Process\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#website\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/\",\"name\":\"NSFOCUS\",\"description\":\"Security Made Smart and Simple\",\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\",\"name\":\"NSFOCUS\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"width\":248,\"height\":36,\"caption\":\"NSFOCUS\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\\\/\\\/nsfocusglobal.com\"],\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Threat Intelligence \u2013 You\u2019re Purchasing the Process - NSFOCUS","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"pt_BR","og_type":"article","og_title":"Threat Intelligence \u2013 You\u2019re Purchasing the Process - NSFOCUS","og_description":"By:\u00a0Stephen Gates, Chief Research Intelligence Analyst, NSFOCUS Over the past year, the cyber security industry has changed significantly in the light of","og_url":"https:\/\/nsfocusglobal.com\/threat-intelligence-youre-purchasing-process\/","og_site_name":"NSFOCUS","article_published_time":"2017-02-06T20:30:14+00:00","og_image":[{"url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/09\/1-6.png","type":"","width":"","height":""}],"author":"admin","twitter_card":"summary_large_image","twitter_title":"Threat Intelligence \u2013 You\u2019re Purchasing the Process - NSFOCUS","twitter_description":"By:\u00a0Stephen Gates, Chief Research Intelligence Analyst, NSFOCUS Over the past year, the cyber security industry has changed significantly in the light of","twitter_image":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/09\/1-6.png","twitter_misc":{"Escrito por":"admin","Est. tempo de leitura":"3 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nsfocusglobal.com\/threat-intelligence-youre-purchasing-process\/#article","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/threat-intelligence-youre-purchasing-process\/"},"author":{"name":"admin","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d"},"headline":"Threat Intelligence \u2013 You\u2019re Purchasing the Process","datePublished":"2017-02-06T20:30:14+00:00","mainEntityOfPage":{"@id":"https:\/\/nsfocusglobal.com\/threat-intelligence-youre-purchasing-process\/"},"wordCount":534,"commentCount":0,"publisher":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization"},"image":{"@id":"https:\/\/nsfocusglobal.com\/threat-intelligence-youre-purchasing-process\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/09\/1-6.png","articleSection":["Blog","Uncategorized"],"inLanguage":"pt-BR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/nsfocusglobal.com\/threat-intelligence-youre-purchasing-process\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/nsfocusglobal.com\/threat-intelligence-youre-purchasing-process\/","url":"https:\/\/nsfocusglobal.com\/threat-intelligence-youre-purchasing-process\/","name":"Threat Intelligence \u2013 You\u2019re Purchasing the Process - NSFOCUS","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nsfocusglobal.com\/threat-intelligence-youre-purchasing-process\/#primaryimage"},"image":{"@id":"https:\/\/nsfocusglobal.com\/threat-intelligence-youre-purchasing-process\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/09\/1-6.png","datePublished":"2017-02-06T20:30:14+00:00","breadcrumb":{"@id":"https:\/\/nsfocusglobal.com\/threat-intelligence-youre-purchasing-process\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nsfocusglobal.com\/threat-intelligence-youre-purchasing-process\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/threat-intelligence-youre-purchasing-process\/#primaryimage","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/09\/1-6.png","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/09\/1-6.png","width":1048,"height":535,"caption":"SSL Certificate Replacement settings interface screenshot."},{"@type":"BreadcrumbList","@id":"https:\/\/nsfocusglobal.com\/threat-intelligence-youre-purchasing-process\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/nsfocusglobal.com\/"},{"@type":"ListItem","position":2,"name":"Threat Intelligence \u2013 You\u2019re Purchasing the Process"}]},{"@type":"WebSite","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#website","url":"https:\/\/nsfocusglobal.com\/pt-br\/","name":"NSFOCUS","description":"Security Made Smart and Simple","publisher":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nsfocusglobal.com\/pt-br\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization","name":"NSFOCUS","url":"https:\/\/nsfocusglobal.com\/pt-br\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/logo\/image\/","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","width":248,"height":36,"caption":"NSFOCUS"},"image":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d","name":"admin","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/nsfocusglobal.com"],"url":"https:\/\/nsfocusglobal.com\/pt-br\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/5105","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/comments?post=5105"}],"version-history":[{"count":0,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/5105\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media\/26424"}],"wp:attachment":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media?parent=5105"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/categories?post=5105"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/tags?post=5105"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}