Cyber Threat Intelligence

Intelligence

Telsy’s Cyber Threat Intelligence (CTI) services offer technology, proprietary platforms, and specialized analytical capabilities to provide detailed analysis and proactive solutions by identifying, analyzing, and mitigating emerging threats to protect organizational cyber perimeters and sensitive information.

CTI services continuously monitor the dark web, hacker forums, and other OSINT sources to provide a complete view of threats, predict attacks, prevent incidents, and respond effectively and timely to cyber incidents.

Contact us at contact@telsy.it to learn more about our Cyber Threat Intelligence services and explore their features.

Prima sezione
icona-security
Reports

Reports structured by genesis, assessment, and context concerning unseen and emerging cyber threats to understand the global risk scenario and the specific risk scenario for your organization.

icona-security
Profiles of opponents

Analysis of adversaries on their activities, capabilities, characteristics, digital weapons, tools, and malware implants in a single model sheet to improve and implement your own protection and analysis policies.

icona-security
Threat Intelligence & Response team

A pool of professionals with technical, investigative, and contextual expertise to monitor attackers and anticipate their actions. Ready to intervene in the event of an attack!

icona-security
Actionable intelligence

Constantly updated, validated, and enriched indicators of compromise to identify or block publicly known, unpublished, or emerging threats.

Platform services

The 3 profiles of TS-Intelligence

Choose the one that best suits your needs

TS-Intelligence Basic

For all organizations and CISOs/CSOs approaching the topic of cyber threat intelligence and needing access to validated information on threats, emerging vulnerabilities, and data breaches. The subscription provides access to insight reports and public indicators of compromise, validated and historicized for both APT and structured crime threats.

TS-Intelligence Professional

A mature and robust approach to cyber threat intelligence, both for APT and structured crime threats. Compared to the basic plan, the insights in terms of insight reports and indicators of compromise are significantly enriched by substantially expanding the information content (which remains validated).

TS-Intelligence Advanced

An advanced, preventive, and contextual approach to malware threats through cyber threat intelligence. Compared to basic and professional profiles, the in-depth analysis of information content, both in terms of insight reports and indicators of compromise, becomes important both qualitatively and quantitatively in anticipating threats.

Features and information

Unlimited users
Unlimited queries
Opponent profiles (more than 300 groups monitored)
Keyword notification
Constantly updated IoC
Direct line to analysts
Can be integrated via API
Multilingual (Italian and English)
Schedulable tasks
Validated OSINT sources
CLOSINT sources
Reports and feeds with TLP clear
Reports and feeds with TLP green
Reports and feeds with TLP amber and red
Misp to Misp and/or TAXII 2.0 server
Platform services

The 3 profiles of TS-Intelligence

Choose the one that best suits your needs

TS-Intelligence Basic

For all organizations and CISOs/CSOs approaching the topic of cyber threat intelligence and needing access to validated information on threats, emerging vulnerabilities, and data breaches. The subscription provides access to insight reports and public indicators of compromise, validated and historicized for both APT and structured crime threats.

Unlimited users
Unlimited queries
Opponent profiles (more than 300 groups monitored)
Keyword notification
Constantly updated IoC
Direct line to analysts
Can be integrated via API
Multilingual (Italian and English)
Schedulable tasks
Validated OSINT sources
Reports and feeds with TLP clear

TS-Intelligence Professional

A mature and robust approach to cyber threat intelligence, both for APT and structured crime threats. Compared to the basic plan, the insights in terms of insight reports and indicators of compromise are significantly enriched by substantially expanding the information content (which remains validated).

Unlimited users
Unlimited queries
Opponent profiles (more than 300 groups monitored)
Keyword notification
Constantly updated IoC
Direct line to analysts
Can be integrated via API
Multilingual (Italian and English)
Schedulable tasks
Validated OSINT sources
CLOSINT sources
Reports and feeds with TLP clear
Reports and feeds with TLP green
Misp to Misp and/or TAXII 2.0 server

TS-Intelligence Advanced

An advanced, preventive, and contextual approach to malware threats through cyber threat intelligence. Compared to basic and professional profiles, the in-depth analysis of information content, both in terms of insight reports and indicators of compromise, becomes important both qualitatively and quantitatively in anticipating threats.

Unlimited users
Unlimited queries
Opponent profiles (more than 300 groups monitored)
Keyword notification
Constantly updated IoC
Direct line to analysts
Can be integrated via API
Multilingual (Italian and English)
Schedulable tasks
Validated OSINT sources
CLOSINT sources
Reports and feeds with TLP clear
Reports and feeds with TLP green
Reports and feeds with TLP amber and red
Misp to Misp and/or TAXII 2.0 server
Additional modules

Enhance and customize your TS-Intelligence plan

To further improve your level of threat readiness, you can rely on complementary services that integrate with your chosen TS-Intelligence profile.
diamond 1

Brand & Vip tailored monitoring

Monitoring of cyber risk exposure for your brand and VIPs. Monthly analytical reports and specific alerts on any malicious campaigns aimed at discrediting and spreading misinformation.

eye

Dark & underground tailored monitoring

Active monitoring of your organization from the outside. Analyzes critical information and produces alert reports (with human validation) based on the IT perimeter (IPv4, domains, email domains).

Chat_0f434ed7 198e 4c8c 8653 20cd73000737

Red line

Direct line to analysts via instant messaging. It is an exclusive space for discussion, validation, enrichment, and in-depth analysis of technical data.

link

Supply chain monitoring

Passive monitoring of exposure to cyber threats to your suppliers and your brand.

Research_29f327bf 89e4 499d 93d4 5b8fc44a5001 1 1

Investigation ticket on demand

A team of three professionals with specific expertise in investigating internal phenomena and analyzing technological data. Partial information and preview situational reports.

attention

Incident response & threat hunting

Vertical professional activity for the detection and response to cybercrime and APT attacks.

report

Executive report

Monthly report for executives (CSO/CISO) summarizing the main cyber threats. Vertical by customer industry.

Internet_8dc12618 f6cc 41d5 b46e d40fde4bf70d 1

Strategic report

Monthly geopolitical report covering a comprehensive overview of the interests pursued by state adversaries or state-sponsored actors (APTs). Executive and extended reports.