Speak to an expert

Thank You

Your form has been submitted successfully.
Oops! Something went wrong while submitting the form.
Managed CTI

Cyber Defence Feed

Both a high-confidence IOC feed for utilisation into security tools as a block list and a comprehensive feed to support alerting and investigation.

chain icon

What is a Cyber Defence Feed?

Structured Intelligence feed that delivers actionable threat data to help organisations detect, prevent, and respond to cyber threats.

Curated feed focusing on malicious/suspicious domains and IP-addresses, which have an associated confidence score

Confidence score is calculated by an algorithm based on the foundation of the extensive CTI database guided by the CTI team knowledge and research

Integrates with existing security tools – SIEM, Threat Intelligence Platforms, Network Security Devices

Speak to an expert

Cyber Defence Feed use-cases

Incident Prevention and Detection

Cyber Defence Feed is designed to be integrated with network perimeter solutions, such as firewalls and IDS/IPS. Data from the feed can be used as a blocklist for external connections

Incident Investigation

The Advanced package of the Cyber Defence Feed is enriched with additional data for integration with your SIEM/SOAR systems to enhance your organisation’s detection capabilities and enrich alerts with additional CSIS research data

Research and Enrichment

Both versions of Cyber Defence feed could be used for research and continues monitoring of threats. You will be able to aggregate, analyse, and disseminate valuable information through Threat Intelligence Platform integration capabilities

chain icon

Key features

Real-Time IOC Updates
Continuously updated feed of malicious domains, IPs, and other indicators of compromise.
Confidence Scoring
All entries are ranked by a proprietary algorithm based on source credibility, frequency, and analyst validation.
Flexible Integration
Supports delivery via STIX/TAXII, CSV or direct integration with SIEM, TIP, SOAR, and network security devices.
Operational Context
Each entry includes metadata and additional context to support both automated blocking and manual investigation.

Speak to an expert
"The quality of the threat intelligence reports we receive from our partner, SecAlliance is best of breed. They are fundamental in our ability to deliver real threat insight into our strategic client engagements."
Security Practice Lead, Consulting

More Managed CTI Services

Latest Blogs

View all posts