About ThreatSync Open

Applies To: ThreatSync Open

ThreatSync Open expands the threat detection and response capabilities of ThreatSync to include third-party security alerts and response actions. With the ThreatSync Management UI as your single point of monitoring and response, you can view third-party incidents and perform response actions directly in ThreatSync. This provides consistency and optimizes response times across multiple security tools. ThreatSync Open enables you to:

  • Ingest, monitor, and respond to third-party incidents from the ThreatSync Management UI
  • Allow third-party firewalls to connect to your ThreatSync Blocked Items list and use it as an integrated threat intelligence feed

For more information on how to configure third-party integrations, go to Third-Party Integrations in ThreatSync.

For more information about how to use the ThreatSync Blocked Items list an integrated threat feed to block IP addresses and domains in a third-party firewall, go to Configure Third-Party Connections to the ThreatSync Blocked Items List.

Licensing

To use ThreatSync Open, you must purchase and activate a ThreatSync Open license. ThreatSync Open is licensed for each user. For more information about licensing, go to About ThreatSync Open Licenses.

Related Topics

Quick Start — Set Up ThreatSync

ThreatSync Best Practices

Monitor with ThreatSync

About ThreatSync