Results for "Cisco"

App-Icon

Cisco Threat Grid

The Cisco Threat Grid CDF is a sandbox which allows the detonation of samples to generate analysis reports. The Cisco Threat Grid CDF for ThreatQ enables a user to ingest their organization’s sample analysis reports from Threat Grid. These samples can be filtered down by their threat score, so you are able to ingest only the detonations that your organization deems important to track.

Version

1.1.0

Categories

Commercial Intelligence,Sandbox
App-Icon

Cisco Threat Grid Operation

The ThreatQuotient for Threat Grid Operation gives users the ability to submit files, URLs, and doma

Version

1.2.2

Categories

Enrichment & Analysis,Sandbox
App-Icon

Cisco Threat Response (CiscoXDR) - Enrichment

The Integration enables a ThreatQ User to enrich IOCs with judgements and other context from Cisco Threat Response (CiscoXDR)

Version

1.1.1

Categories

Enrichment & Analysis
App-Icon

Cisco Threat Response (CiscoXDR) - Operation

The Cisco Threat Response Operation for ThreatQuotient enables a user to query Cisco Threat Response for contextual information on a given indicator of compromise

Version

1.0.0

Categories

Enrichment & Analysis
App-Icon

Cisco Threat Response (CiscoXDR) - Exporter

The Cisco Threat Response Exporter for ThreatQ allows a ThreatQ user to export indicator/observable judgements from ThreatQ to Cisco Threat Response via the Cisco Threat Intelligence API (CTIA)

Version

1.1.1

Categories

Commercial Intelligence
App-Icon

Cisco AMP for Endpoints Connector

The Cisco AMP for Endpoints Integration for ThreatQ allows a user to automatically export hashes to a Cisco AMP for Endpoints blacklist.

Version

1.1.0

Categories

Enrichment & Analysis,EDR
App-Icon

Cisco AMP for Endpoints Operation

This operation allows a ThreatQ user to execute 2 actions on their Cisco AMP for Endpoints instance. The first action allows users to submit a SHA-256 hash from ThreatQ to a Cisco AMP for Endpoints application block list. The second action allows users to query their Cisco AMP for Endpoints events for any hits on a specific SHA-256 hash.

Version

1.0.1

Categories

Enrichment & Analysis,EDR
App-Icon

Cisco AMP for Endpoints CDF

The Cisco AMP for Endpoints CDF enables a ThreatQ user to ingest events from Cisco AMP for Endpoints.

Version

1.1.0

Categories

Enrichment & Analysis,EDR
App-Icon

Cisco Umbrella Investigate Operation

The Cisco Umbrella Investigate Operation for ThreatQuotient enables a user to enrich indicators in ThreatQ with context from Cisco Umbrella.

Version

2.0.0

Categories

Commercial Intelligence
App-Icon

Cisco Umbrella Enforcement Operation

The Cisco Umbrella Enforcement operation for ThreatQ allows users to submit indicators to Cisco Umbrella Enforcement to be either added or removed from blocklist.

Version

1.0.2

Categories

Commercial Intelligence
App-Icon

Cisco Secure Network Analytics Export

Export Cisco Secure Network Analytics (Formerly Lancope) Indicators.

Categories

Threat Prevention
App-Icon

Cisco Umbrella Action Bundle

The Cisco Umbrella actions for ThreatQ enables analysts to use Cisco Umbrella’s APIs for enrichment. Analysts will be able to enrich IOCs from their Threat Library with context from the Cisco Umbrella Investigate API, including but not limited to, the categorization, risk scores, hash samples, and WHOIS information.

Version

1.1.1

Categories

Orchestration
App-Icon

Cisco ESA Export IOC Action Bundle

The Cisco ESA Export IOC Action Bundle uses AsyncOS API for Cisco Secure Email Gateway to enable users to add or delete Safelist and Blocklist entries. Cisco Secure Email Gateway is an email security solution that blocks spam and security threats from the internet and prevents the accidental or intentional leakage of customer data.

Version

1.0.1

Categories

Orchestration

Copyright © 2025, ThreatQuotient, Inc. All Rights Reserved. Privacy Policy