Intel Exchange Lite

Go from Threat Informed to a Threat Led Model

Get measurable benefits from a fully automated threat intel platform, prebuilt with premium threat intelligence feeds and enrichment sources for small and medium-sized security teams.

I want to see a demo

Get measurable benefits from a fully automated threat intel platform, prebuilt with premium threat intelligence feeds and enrichment sources for small and medium-sized security teams.

Problems We Solve

Threat Intel Platform for Medium Sized Cybersecurity Teams

We enable mid-sized cybersecurity teams to simplify and efficiently address the complexities of threat intelligence management.

Data Sheet

Efficient and Effective Use of Threat Intelligence

Difficulty in managing and utilizing vast amounts of threat intelligence data.

Automating Threat Intel Operations

Manual processes are time-consuming and prone to errors.

Scalability for Smaller Teams

Smaller teams often lack the resources to manage extensive threat intelligence operations.

What Our Customers Say

Real Results, Real Security.

Cyware Orchestrate has transformed our customer's security strategies. Our actionable intelligence empowers organizations to proactively manage and mitigate risks through low-code automation enhancing their security confidence.

“Cyware’s platform transformed the agency’s security operations by streamlining incident response, enabling extensive intelligence sharing, and amplifying vulnerability management by integrating enriched threat intelligence.”

“Cyware implemented several use cases, enabling us to optimize our cybersecurity operations, fortify our defenses, and bolster security efficiency.”

“Texas A&M has significantly benefited from our collaboration with Cyware. Their innovative cybersecurity solutions and expert guidance have been instrumental in advancing our security posture, protecting both our network and community. We trust their expertise to keep us ahead in a challenging digital landscape.”

AI-Driven Automated Threat Intel Management

Small and mid-sized cybersecurity teams can leverage automated ingestion, analysis, and actioning, along with advanced customization, detection tool integrations, and robust security collaboration capabilities.

Launch Threat Intel Operations Without Extra Cost

Initiate threat intelligence operations using pre-bundled premium threat intel feeds and enrichment sources from Flashpoint, PolySwarm, alphaMountain, and more, all at no additional cost.

I want to see a demo
Screen 01 Launch Threat Intel Operations Without Extra Cost

Comprehensive Threat Intel Aggregation

Seamlessly ingest and parse both structured and unstructured threat intelligence in STIX format from various sources including commercial feed providers, ISACs/ISAOs, blogs, and emails.

I want to see a demo
Screen 02 Comprehensive Threat Intel Aggregation

Custom IOC Confidence Scoring

Evaluate and score every ingested piece of threat intelligence to swiftly identify and act on high-priority IOCs at machine speed.

I want to see a demo
Screen 03 Custom IOC Confidence Scoring

Automated Threat Intel Actioning

Utilize an in-built custom automation rules engine to automatically trigger threat action in deployed security tools such as SIEM, EDR, and firewalls.

I want to see a demo
Screen 04 Automated Threat Intel Actioning

Feature Rich

Tailored Threat Intel Platform for SMB Cybersecurity Teams

Leverage pre-loaded premium threat intel feeds, automate threat intelligence responses, and enhance collaboration with ISACs, ISAOs, and private sharing communities, all with a platform designed for small and medium-sized cybersecurity teams.

Prebuilt Threat Intel Feeds and Enrichment Sources

Jumpstart your threat intelligence operations with premium pre-loaded feeds and enrichment sources from leading providers like Flashpoint, alphaMountain, PolySwarm, and more.

Bi-directional Threat Intel Sharing

Enhance collaboration with ISACs, ISAOs, and private sharing communities by receiving and sharing threat intelligence in the STIX 2.x format.

Integrated SIEM Solutions

Utilize pre-built SIEM connectors to seamlessly update your SIEM records and perform SIEM lookup for threat detection and monitoring without the need for complex playbooks.

Customized Threat Reports

Generate enriched, personalized reports and threat views tailored for SOC, IR, TI teams, and governance stakeholders such as CISOs and Heads of SOC, TI, and IR teams.

Advanced Query Capabilities

Create powerful and sophisticated queries using the Cyware Query Language (CQL) to delve deeper into extensive threat intelligence data.

Security Metrics Dashboard

Monitor critical security metrics with an extensive widget library, ensuring continuous tracking of threat intelligence flow across your security operations.

Our Features

Cyware Intel Exchange Lite Feature Summary

Prebuilt Threat Intel Feeds and Enrichment Sources

Jumpstart your threat intelligence operations with premium pre-loaded feeds and enrichment sources from leading providers like Flashpoint, alphaMountain, PolySwarm, and more.

Bi-directional Threat Intel Sharing

Enhance collaboration with ISACs, ISAOs, and private sharing communities by receiving and sharing threat intelligence in the STIX 2.x format.

Integrated SIEM Solutions

Use pre-built SIEM connectors to seamlessly update your SIEM records and perform SIEM lookup for threat detection and monitoring without the need for complex playbooks.

Customized Threat Reports

Generate enriched, personalized reports and threat views tailored for SOC, IR, TI teams, and governance stakeholders such as CISOs and Heads of SOC, TI, and IR functions.

Advanced Query Capabilities

Create powerful and sophisticated queries using the Cyware Query Language (CQL) to delve deeper into extensive threat intelligence data.

Security Metrics Dashboard

Monitor critical security metrics with an extensive widget library, ensuring continuous tracking of threat intelligence flow across your security operations.

Compare Intel Exchange Product Editions

Features/CapabilitiesIntel ExchangeIntel Exchange LiteIntel Exchange Spoke
DashboardOut-of-the-Box Dashboard, Sharing of Dashboard, Feeds ROIOut-of-the-Box Dashboard, Sharing of Dashboard, -Out-of-the-Box Dashboard - Limited set of widgets, -, -
ReportsCustom Reporting CapabilitiesCustom Reporting CapabilitiesCustom Reporting Capabilities Max. 2 reports
Intel CollectionCustomizable to Your Organization's Unique Needs Threat Data - All SDO support (STIX 1.x, 2.0 and 2.1 support) Threat Bulletin - Create & View Unstructured Intel - RSS Unstructured Intel - Threat Mailbox Unstructured Intel - Twitter Module Quick Add Intel, Import Intel Webscraper, Webhooks Manual Intel Ingestion via text, URL, file importUpper limit to 50K Objects / Day Threat Data - All SDO support (STIX 1.x, 2.0 and 2.1 support) Threat Bulletin - View Unstructured Intel - RSS Unstructured Intel - Threat Mailbox - Quick Add Intel, Import Intel Webscraper Manual Intel Ingestion via text, URL, file importUpper limit to 10k Objects / Day Threat Data - All SDO support (STIX 2.1 support for ingestion) - - Threat Mailbox (1 mail account only) - Quick Add Intel, Import Intel - Manual Intel Ingestion via text, URL, file import
Inbox CapabilitiesCustomizable to Your Organization's Unique NeedsSharing is allowed to any 3 TAXII Feed ProvidersSharing is allowed to any 1 TAXII Feed Providers
Indicators Allowed (Allowlist)AllAll-
Intel ScoringConfidence Score EngineConfidence Score Engine-
Rules EngineBuild your own rule - UnlimitedBuild your own rule - Max of 10 active rulesBuild your own rule - Max of 2 active rules
Attack NavigatorFull VersionFull Version-
Threat InvestigationFull Version--
Dissemination - Detailed SubmissionCustomizable to Your Organization's Unique NeedsInbox to any 3 TAXI feed providersInbox to any 1 TAXI feed provider
Analyst WorkbenchFang-Defang STIX Conversion Encode-Decode 64 CVSS Calculator Network Utilities--
Global TasksCreate and Action tasks--
My OrgIndicators Allowed WatchlistIndicators Allowed Watchlist-
AuthenticationUsername/Password LDAP 2 FA enabled - Email/TOTPUsername/Password - 2 FA enabled - Email/TOTPUsername/Password - 2 FA enabled - TOTP
Feed IntegrationsAllAllAll
STIX and ISAC IntegrationAllAllMaximum 5 STIX/ISAC sources
Feed EnrichmentAllAll-
Tool Integration - SIEMAllAllAll
Tool Integration - SOAR SolutionAllAllAll
Tool Integration - Network SecurityAllAllAll
Tool Integration - Endpoint Detection ResponseAllAllAll
Console StatusFully Enabled--
SSO EnablementYes--
Hub and SpokeYes--
Open APIYesYesAvailable in Select Configurations Only
Users--2
AdministrationUser Management License Management Custom Entities Management Audit Log Management Tag Management Subscribers ConfigurationAudit Log Management Tag Management User Management License Management Configuration (without Custom Score)User Management Configuration (without Custom Score)

FAQ

Any Questions?