I hope that ThreatBook can integrate a feature where if I detect any internal compromised hosts, I can block or isolate those compromised hosts within my internal network; that would be good. I would want the isolation feature to work either automatically or manually; both work fine for me, but as long as I can isolate the internal compromised assets out of the network, it will be good.
It would be great if ThreatBook could integrate with our ITSM system to streamline the tasks and incident management, and I hope this feature will be provided in the future. Everything is perfect, but I mentioned before that it would be better if ThreatBook integrated with our ITSM system.
Learn what your peers think about ThreatBook Threat Intelligence Platform (TIP). Get advice and tips from experienced pros sharing their opinions. Updated: June 2025.
ThreatBook Threat Intelligence Platform (TIP) serves as a sophisticated cybersecurity tool that empowers users with real-time threat analysis, helping organizations anticipate and mitigate cybersecurity risks efficiently.This platform offers comprehensive threat intelligence capabilities designed to support cybersecurity teams in quickly identifying threats and automating responses. TIP aggregates vast threat data, providing enhanced visibility into potential attacks. Its integration...
I hope that ThreatBook can integrate a feature where if I detect any internal compromised hosts, I can block or isolate those compromised hosts within my internal network; that would be good. I would want the isolation feature to work either automatically or manually; both work fine for me, but as long as I can isolate the internal compromised assets out of the network, it will be good.
It would be great if ThreatBook could integrate with our ITSM system to streamline the tasks and incident management, and I hope this feature will be provided in the future. Everything is perfect, but I mentioned before that it would be better if ThreatBook integrated with our ITSM system.