A CTAC Seat - Virtual Access To All Our Cyber Intelligence Data Sets!

A Cyber Threat Analysis Center (CTAC) seat includes our OpenSearch Dashboards, which allow you to work with our data and/or bring in yours. OpenSearch Dashboards offer an open REST API for integration with as many other systems as neededThese tools provide low learning curves and large user bases.

CTAC single-user license  (OpenSearch Dashboards) includes all historical and nine (9) data sets.

CTAC is offered as a proprietary service. For a demo, pricing, and options, please contact Jim McKee at jmckee@redskyaliance.com


qUESTIONS ON CTAC

Cyber Threat Analysis Center (CTAC) Video

FEATURES

  • CTAC single user license (OpenSearch Dashboards) 10,000 searches/queries a day.

  • API only/raw data feed, 10,000 queries per day, with a max of 10,000 results (over 10,000 results can be obtained using additional paginated queries).

  • OpenSearch dashboard and analytics platform using our full data sets.

  • Customer can craft your own custom Elastic search queries (querying multiple data bases at once). Full 10+ years of our historical data

BENEFITS

  • Cost savings for a large corporation or cyber security analysis

  • Save on analytical manpower (one analyst v. three analysts)

  • Access to indicators in minutes v. hours of manual collection

  • A full access and analytical tool/service

  • Proprietary data

Click on Image to download CTAC product Sheet

 

CTAC QUESTIONS & ANSWERS

Q. Can I access CTAC via an API?

Click Image to download Cyber Threat Whitepaper 03282024 (CTAC)

A. Yes. CTAC users can access our threat intelligence using their own scripts through our REST API. Almost any function which is available in the user interface (GUI) is available through the Red Sky Alliance CTAC API as well.

Q. What is the difference between Red Sky Alliance and a threat intelligence feed?

A. Red Sky Alliance collects data from numerous high-value sources and has access to unique data which, in some cases, cannot be found elsewhere. We collect and aggregate data from numerous public/private feeds and store them in a central database so analysts can access intelligence from Red Sky Alliance and numerous other threat feeds from a single CTAC dashboard.

Q. What is an indicator of compromise?

A. An indicator of compromise (IoC) is an artifact indicating malicious activity on a network or host device. Indicators can range from IP addresses and domains to email addresses and more. Users can search through CTAC for IP addresses, domains, and keywords to find specific cyber threats. Users can also use IoC’s found in CTAC to create blacklists and protect their network from future attacks.

Q. Which platforms make Red Sky Alliance intelligence available?

A. Red Sky Alliance intelligence is accessible through the CTAC platform, but our data is also available in other platforms such as Anomali Threat Stream and Snowflake. Users looking to integrate their own log data with CTAC threat intelligence for correlation analysis can also use the Elysium Analytics platform to enhance current security operations.

Q. Why do I need threat intelligence?

A. Threat intelligence is a critical piece of any good cybersecurity policy. Threat intelligence often indicates malicious activity long before it shows up on an internal system such as an intrusion prevention system (IPS) or SIEM (Security Information Event Management). Internal monitoring is very important, but it is equally important to look at threats outside of a company network (“beyond the gateway”) that may lead to significant attacks/damage in the future.