User-defined custom dashboards
Dashboards provide a clear and concise representation of your work that can be appreciated by security analysts, managers and executives alike.
With OpenCTI, users can create as many custom dashboards with as many widgets as they want and display any data type from the platform in their preferred manner. This flexibility enables users to effectively illustrate both high-level assessments of the threat landscape as well as specific Priority Intelligence Requirement-led (PIR) threat hunting dashboards.
Beyond operational flexibility, users can easily make these dashboards publicly available or specific to a community and even control whether sensitive information is included or not.
Bi-directional integrations
Establish a connection between OpenCTI and other existing detection solutions by transmitting data from OpenCTI to third-party solutions, as well as drawing alerts from these third-party solutions into OpenCTI.
This bi-directional integration is essential to enhance visibility on possible threats, synergize existing security solutions and maintain the integrity of strategic information during threat hunting and monitoring processes.
Case management with templates
OpenCTI supports case management with templates that include pre-defined tasks and severity matrices based on the origin of the case. These templates save a significant amount of time for cybersecurity teams, streamlining the process of tracking and managing potential threats.
This consistency across various types of information and solutions enhances the overall efficiency and reliability of threat management efforts.
Ease of sharing intelligence
Share threat intelligence, dashboards, and KPIs (e.g., incidents, detected attacks, reports, etc.) with subsidiaries and within the client group by publishing feeds on the internet, within the community, and sharing via email or a permanent link.
The OpenCTI platform not only allows users to share information and intelligence with others but also to receive and consume information from partners, external sources, and customers via manual or automated mechanisms (e.g. direct input, file imports, streams…)
It is easy for OpenCTI users to create and manage new accounts, users, and access, ensuring full control over the complexity of information sharing. This facilitates collaboration, enhances visibility in threat hunting and threat monitoring, ensures seamless knowledge sharing, and improves threat management efficiency.