ThreatQuotient, today announced that in addition to the current professional services of implementation, training and development, the company now offers consulting services that range from an initial assessment of current threat intelligence capabilities, to more in-depth and long-term process development.
The ultimate goal is to mature a program to the point that a team can confidently address specific use cases like spearphishing, threat hunting and vulnerability management. ThreatQuotient’s services can educate new cyber intelligence teams, refocus teams onto specific classes of threats, and operationalize an intelligence practice.
“At ThreatQuotient, we know building a security operations program is hard, and building one that is threat-centric is even more difficult. Our team is here to help at every stage – from assessing whether a company will get value out of a threat intelligence program, all the way to helping the most mature and sophisticated teams diversify their use cases,” said Jonathan Couch, SVP Strategy, ThreatQuotient.
ThreatQuotient’s Professional Services also guide the development of a strategic plan, which embeds threat intelligence within all functions of security operations, by taking into account stakeholder analyses, risk identification and a one to three year growth plan. In addition, ThreatQuotient enables security executives to leverage the application of global threat intelligence to communicate effectively with their business leadership.
“ThreatQuotient’s services team uses best practices for threat intelligence and training to consult on applying the right processes and workflows, accelerating detection and response, and integrating ThreatQ with each enterprise’s unique ecosystem of pre-existing technologies to extend the architecture of their security operations,” said Firas Ghanem, Regional Director – Middle East & Pakistan at ThreatQuotient.
“With our new assessment service, ThreatQuotient extends to help organizations that are new to threat intelligence answer an important but difficult question – are we ready to get value from a cyber threat intelligence program? If they are not, we can work to get them ready and help set up the people, processes, and technologies necessary to integrate intelligence into security operations and cyber risk management programs.” Ghanem added.