Threat intelligence is often treated as a separate function within a broader security paradigm — in reality, it’s an essential component that augments every other security function. Whether you’re working in security operations, incident response, vulnerability management, or another role, there’s a threat intelligence solution out there that you’ll benefit from.

But how do you choose the right one? Gartner's "Market Guide for Security Threat Intelligence Products and Services” explains different use cases for how to best use threat intelligence in your organization.

You will learn how to:

  • Identify 12 common threat intelligence use cases
  • Align these use cases to your specific requirements
  • Implement strategies for getting value from threat intelligence
  • Evaluate vendors based on your business needs

Gartner does not endorse any vendor, product, or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, express or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

Gartner, Market Guide for Security Threat Intelligence Products and Services, Craig Lawson, Ryan Benson, Ruggero Contu, 19 February 2019

Tell Your Network
   

Download Your Copy

By supplying your contact information, you authorize Recorded Future to contact you. You may opt out at anytime.

We'll never rent or sell your information to other vendors. Period.