{"id":213209,"date":"2018-02-14T12:38:08","date_gmt":"2018-02-14T12:38:08","guid":{"rendered":"https:\/\/www.intrinsec.com\/?p=213209"},"modified":"2018-02-14T12:38:08","modified_gmt":"2018-02-14T12:38:08","slug":"cyber-threat-intelligence-observez-ce-qui-est-hors-de-portee","status":"publish","type":"post","link":"https:\/\/www.intrinsec.com\/en\/cyber-threat-intelligence-observez-ce-qui-est-hors-de-portee\/","title":{"rendered":"What is Cyber Threat Intelligence?"},"content":{"rendered":"<h2><strong><span style=\"color: #c41718;\">What is Cyber Threat Intelligence?<\/span><\/strong><\/h2>\n<p><img fetchpriority=\"high\" decoding=\"async\" class=\"alignright wp-image-215936\" src=\"\/wp-content\/uploads\/alessio-lin-208182-unsplash-1.jpg\" alt=\"Cyber Threat Intelligenc\" width=\"250\" height=\"377\" \/><\/p>\n<p>In a few words, the <strong>Cyber Threat Intelligence<\/strong> is a service based on a cyber intelligence approach, which allows\u2019<strong>to anticipate and detect threats across all layers of the Internet<\/strong> (Surface, Deep and Dark). The Threat Intelligence unit operates at both strategic and technical levels.<\/p>\n<p>On the one hand, it allows us to provide information on the <strong>attacker\/attacked contexts<\/strong> and sector-specific monitoring reports, by identifying the company&#039;s specific context. On the other hand, it addresses fundamental challenges for businesses by identifying threats with rapid operational leverage: combating <strong>data leaks<\/strong> and the <strong>fraud<\/strong>, protection of the information system, personal data and finally of the\u2019<strong>brand image<\/strong>. This offering goes hand in hand with the SOC, as it allows for the observation and analysis of what is happening outside the information system, with the aim of detecting incidents and...\u2019<strong>help businesses respond<\/strong>.<\/p>\n<p>Beyond the ongoing nature of the service, this approach can be used on an ad hoc basis to carry out a\u00a0<strong>state\u00a0<\/strong><strong>places<\/strong> or to support other initiatives (risk assessment in the context of an acquisition, request for information to support an internal investigation, etc.)<\/p>\n<h2><strong><span style=\"color: #c41718;\">Who is Cyber Threat Intelligence aimed at?<\/span><\/strong><\/h2>\n<p>Cyber Threat Intelligence is a powerful solution, primarily aimed at organizations with <strong>a major exhibition<\/strong><strong>\u00a0<\/strong>: a large technological footprint, information assets to protect, a large number of employees, or a substantial supply chain. Smaller organizations can also find a solution there. <strong>insurance interest<\/strong>, where the biggest ones will receive a<strong> regular stream of alerts<\/strong>. Feel free to consult <u>our feedback<\/u>\u00a0 from the Rocher Group to learn more about our methods.<\/p>\n<h2><strong><span style=\"color: #c41718;\">What is the added value of Cyber Threat Intelligence at Intrinsec?<\/span><\/strong><\/h2>\n<p><img decoding=\"async\" class=\"alignleft wp-image-213719\" src=\"\/wp-content\/uploads\/Cybers%C3%A9curit%C3%A9-valeurs-Intrinsec.png\" alt=\"Cyber Threat Intelligence\" width=\"300\" height=\"199\" \/>Our experience as a pure player offering an end-to-end approach to cybersecurity issues allows us to integrate this topic into <strong>a global strategy<\/strong>\u00a0; The service provided therefore takes into account all our experiences (<strong>both operational and organizational<\/strong>), to propose pragmatic solutions and recommendations.<\/p>\n<p>By supporting organizations of all sizes on this topic since 2014, we have developed a practice that allows us to ensure rapid implementation. Service users receive initial alerts within the first few days of activation, and we support them throughout the service to build their program. <strong>Threat Intelligence<\/strong> and do it<strong> evolve with their context<\/strong>.<\/p>\n<p>Finally, by mixing a <strong>exclusive technology platform<\/strong>, to a <strong>an experienced team of multilingual monitors and analysts<\/strong> (particularly in Asia, Russia and Arabic-speaking countries), we guarantee to maintain technological relevance and the ability to address an international context.<\/p>\n<p>According to <a href=\"https:\/\/www.gartner.com\/en\">Gartner<\/a>, <em>\u00ab<\/em><em>\u00a0<\/em><em>In 2018, 601,300 companies will use Threat Intelligence<\/em><em>\u00a0<\/em><em>\u00bb<\/em>. A practice that has become widespread in the United States, but is still underutilized in France.<\/p>\n<p style=\"text-align: center;\"><strong><em>If you too wish to react before being affected and reduce the risks of cyberattacks against your company, our consultants will be happy to answer your questions and offer you a tailor-made solution.<\/em><\/strong><\/p>\n<p style=\"text-align: center;\"><strong><em>Feel free to contact us at <\/em><a href=\"mailto:contact@intrinsec.com\"><em>contact@intrinsec.com.<\/em><\/a><\/strong><\/p>\n<p style=\"text-align: center;\"><strong><a href=\"https:\/\/intrinsec.us13.list-manage.com\/subscribe?u=403249ad144b732517b9fca94&amp;id=5e6692896f\">Sign up for our newsletter to receive more<\/a><\/strong><\/p>\n<p style=\"text-align: center;\"><strong><a href=\"https:\/\/intrinsec.us13.list-manage.com\/subscribe?u=403249ad144b732517b9fca94&amp;id=5e6692896f\">news about your security challenges.<\/a><\/strong><\/p>\n<p>[et_pb_row _builder_version= \u00bb3.9\u2033][et_pb_column type= \u00bb4_4\u2033 _builder_version= \u00bb3.9\u2033 parallax= \u00bboff \u00bb parallax_method= \u00bbon \u00bb][et_pb_button custom_button= \u00bbon \u00bb button_text_color= \u00bb#ffffff \u00bb button_text= \u00bbDiscover our Cyber Threat offering Intelligence \u00bb _builder_version= \u00bb3.9\u2033 button_alignment= \u00bbcenter \u00bb button_font= \u00bb|||||||| \u00bb][\/et_pb_button][\/et_pb_column][\/et_pb_row]<\/p>","protected":false},"excerpt":{"rendered":"<p>What is Cyber Threat Intelligence? In a nutshell, Cyber Threat Intelligence is [\u2026]<\/p>","protected":false},"author":1,"featured_media":213717,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[9],"tags":[167],"class_list":["post-213209","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-threat-intelligence","tag-itw-camille-cti"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.0 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Qu&#039;est-ce que Cyber Threat Intelligence ?<\/title>\n<meta name=\"description\" content=\"La Cyber Threat Intelligence est un service bas\u00e9 sur une approche de renseignement cyber, qui\u00a0permet d\u2019anticiper et de d\u00e9tecter les menaces\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intrinsec.com\/en\/cyber-threat-intelligence-observez-ce-qui-est-hors-de-portee\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Qu&#039;est-ce que la Cyber Threat Intelligence ?\" \/>\n<meta property=\"og:description\" content=\"La Cyber Threat Intelligence est un service bas\u00e9 sur une approche de renseignement cyber, qui\u00a0permet d\u2019anticiper et de d\u00e9tecter les menaces\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intrinsec.com\/en\/cyber-threat-intelligence-observez-ce-qui-est-hors-de-portee\/\" \/>\n<meta property=\"og:site_name\" content=\"INTRINSEC\" \/>\n<meta property=\"article:published_time\" content=\"2018-02-14T12:38:08+00:00\" \/>\n<meta name=\"author\" content=\"Intrinsec\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Intrinsec\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/cyber-threat-intelligence-observez-ce-qui-est-hors-de-portee\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/cyber-threat-intelligence-observez-ce-qui-est-hors-de-portee\\\/\"},\"author\":{\"name\":\"Intrinsec\",\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/#\\\/schema\\\/person\\\/ade590fbc7ad6f413727bae7cd3fb799\"},\"headline\":\"Qu&rsquo;est-ce que la Cyber Threat Intelligence ?\",\"datePublished\":\"2018-02-14T12:38:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/cyber-threat-intelligence-observez-ce-qui-est-hors-de-portee\\\/\"},\"wordCount\":646,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/cyber-threat-intelligence-observez-ce-qui-est-hors-de-portee\\\/#primaryimage\"},\"thumbnailUrl\":\"\",\"keywords\":[\"Itw Camille CTI\"],\"articleSection\":[\"Cyber Threat Intelligence\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.intrinsec.com\\\/cyber-threat-intelligence-observez-ce-qui-est-hors-de-portee\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/cyber-threat-intelligence-observez-ce-qui-est-hors-de-portee\\\/\",\"url\":\"https:\\\/\\\/www.intrinsec.com\\\/cyber-threat-intelligence-observez-ce-qui-est-hors-de-portee\\\/\",\"name\":\"Qu'est-ce que Cyber Threat Intelligence ?\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/cyber-threat-intelligence-observez-ce-qui-est-hors-de-portee\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/cyber-threat-intelligence-observez-ce-qui-est-hors-de-portee\\\/#primaryimage\"},\"thumbnailUrl\":\"\",\"datePublished\":\"2018-02-14T12:38:08+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/#\\\/schema\\\/person\\\/ade590fbc7ad6f413727bae7cd3fb799\"},\"description\":\"La Cyber Threat Intelligence est un service bas\u00e9 sur une approche de renseignement cyber, qui\u00a0permet d\u2019anticiper et de d\u00e9tecter les menaces\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/cyber-threat-intelligence-observez-ce-qui-est-hors-de-portee\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.intrinsec.com\\\/cyber-threat-intelligence-observez-ce-qui-est-hors-de-portee\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/cyber-threat-intelligence-observez-ce-qui-est-hors-de-portee\\\/#primaryimage\",\"url\":\"\",\"contentUrl\":\"\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/cyber-threat-intelligence-observez-ce-qui-est-hors-de-portee\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/www.intrinsec.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Qu&rsquo;est-ce que la Cyber Threat Intelligence ?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/#website\",\"url\":\"https:\\\/\\\/www.intrinsec.com\\\/\",\"name\":\"INTRINSEC\",\"description\":\"Notre m\u00e9tier , Prot\u00e9ger le v\u00f4tre\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.intrinsec.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/#\\\/schema\\\/person\\\/ade590fbc7ad6f413727bae7cd3fb799\",\"name\":\"Intrinsec\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fde6ed961c7078765b03a213927b5c4001b1cef4787255188f5b502a99e6ddd6?s=96&d=retro&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fde6ed961c7078765b03a213927b5c4001b1cef4787255188f5b502a99e6ddd6?s=96&d=retro&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fde6ed961c7078765b03a213927b5c4001b1cef4787255188f5b502a99e6ddd6?s=96&d=retro&r=g\",\"caption\":\"Intrinsec\"},\"sameAs\":[\"https:\\\/\\\/www.intrinsec.com\"],\"url\":\"https:\\\/\\\/www.intrinsec.com\\\/en\\\/author\\\/ufhtbqccsz\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"What is Cyber Threat Intelligence?","description":"Cyber Threat Intelligence is a service based on a cyber intelligence approach, which allows for the anticipation and detection of threats.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intrinsec.com\/en\/cyber-threat-intelligence-observez-ce-qui-est-hors-de-portee\/","og_locale":"en_US","og_type":"article","og_title":"Qu'est-ce que la Cyber Threat Intelligence ?","og_description":"La Cyber Threat Intelligence est un service bas\u00e9 sur une approche de renseignement cyber, qui\u00a0permet d\u2019anticiper et de d\u00e9tecter les menaces","og_url":"https:\/\/www.intrinsec.com\/en\/cyber-threat-intelligence-observez-ce-qui-est-hors-de-portee\/","og_site_name":"INTRINSEC","article_published_time":"2018-02-14T12:38:08+00:00","author":"Intrinsec","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Intrinsec","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.intrinsec.com\/cyber-threat-intelligence-observez-ce-qui-est-hors-de-portee\/#article","isPartOf":{"@id":"https:\/\/www.intrinsec.com\/cyber-threat-intelligence-observez-ce-qui-est-hors-de-portee\/"},"author":{"name":"Intrinsec","@id":"https:\/\/www.intrinsec.com\/#\/schema\/person\/ade590fbc7ad6f413727bae7cd3fb799"},"headline":"Qu&rsquo;est-ce que la Cyber Threat Intelligence ?","datePublished":"2018-02-14T12:38:08+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intrinsec.com\/cyber-threat-intelligence-observez-ce-qui-est-hors-de-portee\/"},"wordCount":646,"commentCount":0,"image":{"@id":"https:\/\/www.intrinsec.com\/cyber-threat-intelligence-observez-ce-qui-est-hors-de-portee\/#primaryimage"},"thumbnailUrl":"","keywords":["Itw Camille CTI"],"articleSection":["Cyber Threat Intelligence"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intrinsec.com\/cyber-threat-intelligence-observez-ce-qui-est-hors-de-portee\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.intrinsec.com\/cyber-threat-intelligence-observez-ce-qui-est-hors-de-portee\/","url":"https:\/\/www.intrinsec.com\/cyber-threat-intelligence-observez-ce-qui-est-hors-de-portee\/","name":"What is Cyber Threat Intelligence?","isPartOf":{"@id":"https:\/\/www.intrinsec.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intrinsec.com\/cyber-threat-intelligence-observez-ce-qui-est-hors-de-portee\/#primaryimage"},"image":{"@id":"https:\/\/www.intrinsec.com\/cyber-threat-intelligence-observez-ce-qui-est-hors-de-portee\/#primaryimage"},"thumbnailUrl":"","datePublished":"2018-02-14T12:38:08+00:00","author":{"@id":"https:\/\/www.intrinsec.com\/#\/schema\/person\/ade590fbc7ad6f413727bae7cd3fb799"},"description":"Cyber Threat Intelligence is a service based on a cyber intelligence approach, which allows for the anticipation and detection of threats.","breadcrumb":{"@id":"https:\/\/www.intrinsec.com\/cyber-threat-intelligence-observez-ce-qui-est-hors-de-portee\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intrinsec.com\/cyber-threat-intelligence-observez-ce-qui-est-hors-de-portee\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.intrinsec.com\/cyber-threat-intelligence-observez-ce-qui-est-hors-de-portee\/#primaryimage","url":"","contentUrl":""},{"@type":"BreadcrumbList","@id":"https:\/\/www.intrinsec.com\/cyber-threat-intelligence-observez-ce-qui-est-hors-de-portee\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.intrinsec.com\/"},{"@type":"ListItem","position":2,"name":"Qu&rsquo;est-ce que la Cyber Threat Intelligence ?"}]},{"@type":"WebSite","@id":"https:\/\/www.intrinsec.com\/#website","url":"https:\/\/www.intrinsec.com\/","name":"INTRINSEC","description":"Our job is to protect yours.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intrinsec.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.intrinsec.com\/#\/schema\/person\/ade590fbc7ad6f413727bae7cd3fb799","name":"Intrinsic","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/fde6ed961c7078765b03a213927b5c4001b1cef4787255188f5b502a99e6ddd6?s=96&d=retro&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/fde6ed961c7078765b03a213927b5c4001b1cef4787255188f5b502a99e6ddd6?s=96&d=retro&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fde6ed961c7078765b03a213927b5c4001b1cef4787255188f5b502a99e6ddd6?s=96&d=retro&r=g","caption":"Intrinsec"},"sameAs":["https:\/\/www.intrinsec.com"],"url":"https:\/\/www.intrinsec.com\/en\/author\/ufhtbqccsz\/"}]}},"_links":{"self":[{"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/posts\/213209","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/comments?post=213209"}],"version-history":[{"count":0,"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/posts\/213209\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/"}],"wp:attachment":[{"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/media?parent=213209"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/categories?post=213209"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/tags?post=213209"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}