In the ever-evolving landscape of cyber threats, staying ahead of adversaries requires cutting-edge tools and advanced intelligence capabilities. We are thrilled to announce the release of Intelligence Center 3.4, a game-changing upgrade designed to empower organizations with AI-powered features and powerful threat intelligence capabilities. Whether you are a SOC or CTI analyst, Intelligence Center 3.4 offers innovative features that will redefine your approach to cyber threat management.
Unleashing the power of AI
AI Provider Configuration
With the launch of Intelligence Center 3.4, analysts gain ultimate flexibility in selecting the ideal Large Language Model (LLM) for various AI-driven tasks. The current version features OpenAI, and future releases will include support for additional models. This capability empowers analysts to tailor their AI functionalities to suit their organization's unique needs, ensuring they always have the optimal solution for analyzing threats and generating insights.
AI-Powered Natural Language Search
Our latest feature enables analysts to simply ask questions in plain language, without needing to master complex query syntax. It also supports multilingual queries, ensuring that language barriers do not impede the search process. This means more relevant intelligence at their fingertips, quicker and easier than ever before. Curious to learn more? Check out this separate post.
AI Writing Assistant
Crafting high-quality intelligence reports is an essential but often daunting task for cybersecurity professionals. With the AI Writing Assistant, analysts can say goodbye to the tedious task of manual editing and proofreading. This tool is designed to streamline the content creation process, freeing them to concentrate on in-depth analysis. For more information, don't miss our blog where we cover this topic in detail.
Enhanced threat intelligence
MITRE ATT&CK Navigator and v.15.1 Integration
Analysts can now benefit from the new ATT&CK Analysis tools that enable interactive navigation of the ATT&CK matrix, allowing the creation of heatmaps that visualize TTP trends and instantly identify potential threat hotspots. This means more accurate threat management and data-driven decision-making for prioritizing threat detection and mitigation. We've also updated the framework to the latest version (v.15.1) and expanded support to include Mobile and ICS matrices. Read this blog post to learn more.
Real-time alerts, data-driven decision-making, increased operational efficiency, and improved collaboration
Extended STIX 2.1 Support with Collaborative Notes
Collaboration is crucial in cybersecurity, and our new collaborative notes feature enhances this by allowing users to create, edit, and manage notes directly within our platform. Notes can be attached to specific STIX entities and observables, providing contextual relevance to threat data. Additionally, users can export and import notes in standard formats like STIX 2.1 and EIQ-JSON, ensuring seamless sharing of critical insights within and outside the organization. This creates a unified and informed approach to threat management, improving communication and documentation. Want to explore this further? Visit our blog on the topic for an in-depth look.
Keyword-Based Watchlist
With our keyword-based watchlist feature, analysts can achieve precise monitoring and alerting by effortlessly creating and managing customized keyword lists. This tool streamlines data filtering, ensuring alerts are tailored to the organization's specific interests. By specifying search criteria such as title, description, tags, and sources, analysts can efficiently focus on actionable intelligence. Whether monitoring software tools, brand activity, or threat actors, this feature guarantees real-time awareness of critical content. Find out how this feature may be of use to your organization in this post.
Relational Search in Dataset
This capability allows analysts to save and reuse relational search queries, providing quick access to interconnected data whenever needed. By streamlining workflows, it makes finding and acting on crucial information more efficient than ever. Analysts can now store relational searches for future use, saving valuable time and effort. Additionally, this feature integrates seamlessly with existing workflows, enabling easy dissemination in outgoing feeds.
EclecticIQ Intelligence Center 3.4: a game-changer for threat intelligence
EclecticIQ Intelligence Center 3.4 represents a significant leap forward in threat intelligence capabilities. With powerful AI features, advanced tools for MITRE ATT&CK analysis, and numerous developments designed to streamline operations and improve collaboration, this release is poised to transform the way CTI and SOC analysts work.
Ready to elevate your threat intelligence operations?
Contact us today to learn more about EclecticIQ Intelligence Center 3.4 and how it can empower your team with cutting-edge capabilities and unmatched efficiency. Don’t miss out on the opportunity to stay ahead of the curve and enhance your cybersecurity defenses.