Context
As cyber threats including phishing, infostealers, and ransomware intensified for over 40 clients, Controlware’s SOC adapted quickly to reinforce its security posture and protect its growing customer base. Customers were no longer looking only for alert handling but for a partner able to anticipate new threat vectors and react before attackers could execute their objectives. This evolution required a more aligned, intelligence-driven approach to ensure that every customer, regardless of their environment, benefited from the same level of insight and protection.
Challenges
Productivity bottlenecks caused by manual detection work
As an MSSP, Controlware was providing managed services for customers who were using different XDR platforms with their own query language. As Dominik Degroot, Senior Cyber Security Analyst at Controlware GmbH, explains, “Our Sigma rules had to be rewritten manually for each XDR, which turned one rule into three versions. Deployment required logging into every customer environment and testing it separately. It limited how many rules we could produce and how fast we could respond.”
Limited detection effectiveness
Controlware’s detection rules existed as isolated artefacts, with no links to threat actors, malware families, or ATT&CK techniques. “Without structured intelligence, a rule was just a rule. We couldn’t see which actor used that technique or why an alert mattered, and analysts had to invest significant time to gather essential context,” Dominik Degroot notes.
Limited capacity to scale detection engineering
Managing security for customers means dealing with millions of events and thousands of incidents every month. Manual detection workflows imposed a hard ceiling on how fast Controlware could expand its detection coverage. As Dominik Degroot recalls, “The effort required to deploy and validate each rule across environments significantly slowed down our ability to expand coverage.”
SOC stuck in a time-consuming process
Without an operational backbone for large-scale hunting, security operations were time-consuming. “The core problem was to manage detection logic once and deploy it everywhere,” Dominik remembers.
Scaling threat hunting with OpenCTI
A structured and centralized STIX Threat Intelligence repository
OpenCTI provided a unified, STIX-based knowledge base, and the flexibility to create custom entities for Sigma rules independently of XDR-specific query languages. This turned detection rules into fully modelled, versioned, and searchable objects, all accessible through a single API. As Dominik notes: “Treating rules as first-class objects was essential. OpenCTI gave us the structure to do that.”
A knowledge graph that connects rules to real threats
With OpenCTI’s knowledge graph, detection rules are embedded in a dynamic model, where each rule is anchored in a living, actionable threat context. “OpenCTI isn’t just an indicator aggregator. It allowed us to handle threats, malware families, campaigns, TTPs and Sigma rules, all in one structured knowledge base,” says Dominik.
API-first architecture built for automation and scale
OpenCTI’s API-first architecture exposed every intelligence and detection object through a consistent, well-documented interface, enabling Controlware to industrialize detection logic across customer environments. “The API was a decisive factor. Without a backend designed for automation, scaling simply wouldn’t have been possible,” Dominik remembers.
Open platform enabling proactive threat hunting
Another crucial element for Controlware was having an enterprise-grade intelligence platform that could support proactive threat hunting. By providing a structured backbone for intelligence, workflows, and automation, OpenCTI enabled the team to systematically search for early-stage malicious activity. “Once we had the right intelligence backbone, we could finally think beyond alerts and start hunting threats proactively.”
Adoption
Within a few weeks, Controlware deployed OpenCTI, modeled its Sigma workflows, and integrated the platform into daily SOC operations. Controlware used it as the basis for HuntingGrid, the automated multi-XDR search system that Controlware was developing. HuntingGrid retrieves Sigma rules, converts them into the correct query language, runs hunts throughout all customer environments, and aggregates results for analysts.
Thanks to Filigran’s clear documentation and guidance, OpenCTI became fully operational very quickly. “By the end, we had custom workflows, a complete knowledge base, and a team that was trained and ready to work with the new system,”