Which threat feeds are used by ConcealBrowse? Which threat feeds are used by ConcealBrowse?

Which threat feeds are used by ConcealBrowse?

Question:

Which threat feeds are used by ConcealBrowse?

 

Answer:

ConcealBrowse uses some of the most advanced and highly rated intelligence consumed by industry leading security solutions, combined with our own internal threat intelligence feeds, to give the most robust determinations before isolation occurrence.

 

As such, the decision models used by ConcealBrowse rely on several inputs that evolve as our model improves.  One set of inputs includes a selection of proprietary, open sourced and commercial threat intelligence. The mix of each varies based on several factors, and the overall extent to which the model relies on this input set also varies as active feedback loops determine their impact on intended outcomes.

 

An added benefit is that Conceal allows an organization to include its own intelligence feeds.  We offer multiple, distinct plugin integrations. You can find more about that in the article Navigating the Plugins section of ConcealBrowse.

 

Related Articles:

- What information does Conceal share?

 

*Never hesitate to contact your Customer Success Manager for any questions or concerns. You may also open a support ticket at support.conceal.io by scrolling to the bottom and clicking Submit a request.