Threat Insights include:
- Breached Hosts - Breached Hosts identify hosts in your network that might be compromised based on intelligence gathered from your Tippingpoint devices.
- Attacked Vulnerable Hosts - Attacked Vulnerable Hosts identify vulnerabilities in your network. Third-party scans generate the vulnerability data, which the SMS imports and presents as a list. This enhanced visibility into your network enables you to use the third-party vulnerability data to match DV filters with publicly known Common Vulnerabilities and Exposures (CVEs). You can then make immediate updates to your security policy for the protection of your network.
- Suspicious Objects - Suspicious Objects use intelligence gathered from your ATP devices and your TippingPoint devices to block malware and other infections at wire speed. In addition to preventing infections and disrupting malware communications, this integrated environment protects critical resources and isolates infected resources. Suspicious Objects also use data provided by Digital Vaccines (DVs) and the Reputation Database. When your ATP device detects a threat, the ATP device alerts your TippingPoint IPS and TPS devices. The ATP device uses the SMS Reputation Management API to connect with the SMS. This connection enables your TippingPoint IPS and TPS devices to generate reputation events.
- ZDI Filter Hits - Zero Day Initiative (ZDI) Filter Hits identify the number of blocked or permitted hits for Pre-Disclosed and ZDI Disclosed filters. Digital Vaccine (DV) filters provide global threat intelligence to help you gain control of your organization's patch management life cycle. DV filter protection covers the time between when a vulnerability is discovered and when a patch is made available. In addition, DV filters provide added protection for legacy, out-of-support software. DV packages are delivered weekly, or immediately when critical vulnerabilities emerge, and can be deployed automatically with no user interaction required.