Advantages of Threat Graph
Technical features
Purpose-built graph database for cybersecurity
Power of Security Cloud
Use network effect to protect everyone against a new threat, regardless of where it is encountered
See value from Day One, with no additional custom tuning, costly consulting, re-architecting or maintenance overhead
Automatically scales and grows with demand and change
Power of data
Reveal contextual relationships between data elements to identify and respond to new and unusual threats in real time by applying graph analytics and ML algorithms
The robust query and search engine provides current and historical forensic details to arm responders for threat investigations
On-demand access to enriched data with powerful visualization dashboards helps investigators understand the full context of the attack on any affected host, regardless of location
Maximum security efficiency
Telemetry is enriched with real-world threats and identifies new attacks associated with known threat actors
Real-time visualization and automated concurrent analysis lead to faster investigation and response times
Threat hunters can run ad hoc queries for successful and timely detections of unknown threats
Single source of truth
The lightweight agent provides smart-filtering capability streams relevant data for enrichment and correlation to the Threat Graph — with no performance impact
Powerful APIs allow for security orchestration, automation, response and other advanced workflows
APIs and bidirectional data flow enable tight integrations with third-party security and IT solutions to share insights from multiple data sources
Threat Graph scales with demand and provides necessary storage, compute and rich analytics required, with up to a year of all detections encountered
Optional offline replica of enriched telemetry is available for archive, compliance requirements and additional analytics