TruSTAR is partnering with R-CISC to enhance their threat intelligence exchange infrastructure for members.
Specifically, we’re pleased to partner with R-CISC because we share the following values:
• An analyst-first approach - SOC analysts are inundated with alerts and data management. TruSTAR’s platform speeds data ingest and automates redaction, which helps analysts get into mitigation mode faster. Without burdensome data janitor work, analysts get to investigate threats immediately.
• Trust and anonymity - TruSTAR protects company identities and data through auto-redaction. Users can see peer IoCs and TTPs without direct attribution, exchanging data without disclosing identity.
• Accessibility - TruSTAR’s R-CISC platform is ideal for organizations of all sizes. Through graph database IoC search and data exploration, security analysts can contextualize threats more effectively.
To learn more about how TruSTAR is working with R-CISC, read the full announcement here.
If you’re an R-CISC member company, contact email@example.com or sign-up below for more information on how to get started.