Securonix has partnered with AI SPERA to integrate Criminal IP’s live threat intelligence into the ThreatQ platform, aiming to provide security teams with enriched IP context and faster, more confident threat prioritization and response.

  • Integrated Criminal IP data enriches ThreatQ threat investigations
  • Automated workflows maintain current threat context without added effort
  • One-click lookups streamline analyst access to malicious IP insights

What happened

Securonix Inc., a cybersecurity solutions company, announced a strategic partnership with AI SPERA Inc., a cyberthreat intelligence provider. This collaboration integrates AI SPERA’s Criminal IP real-time threat intelligence into Securonix’s ThreatQ platform. Through this integration, security teams can seamlessly enrich IP indicators with detailed risk data directly within ThreatQ’s orchestration and investigation workflows.

The integration enables automated enrichment of incoming IP address indicators using Criminal IP’s database, which includes information such as maliciousness scores, VPN detection, exposure of remote access points, open port statuses, and related vulnerabilities. Additionally, analysts can perform on-demand Criminal IP lookups from within ThreatQ, improving the efficiency of threat investigations.

Advertising
Reserved for inline-leaderboard

Why it matters

As organizations face increasing alert volumes and fragmented threat intelligence sources, security teams struggle to keep pace with manual lookups and disparate data. By embedding Criminal IP data within ThreatQ, Securonix helps reduce analyst workload and improve decision-making by providing richer, more actionable threat context from a single platform.

This partnership enhances ThreatQ’s open ecosystem by enabling continuous, automated enrichment of IP indicators that support accurate prioritization. Security teams benefit from staying current on threat indicators without additional manual effort, leading to faster and more confident responses to cyber threats relevant to their specific environments.

What to watch next

Security organizations adopting this integrated solution should monitor the impact on alert triage efficiency and investigation accuracy as real-time Criminal IP intelligence becomes a native part of their workflows. Adoption levels and analyst feedback will provide insight into how well this partnership addresses common challenges in threat intelligence enrichment and prioritization.

Future developments may include expanding the scope of integrated data sources within ThreatQ, refining automation capabilities, and enhancing the ease of access to contextual IP information. Keeping an eye on how this collaboration evolves could reveal trends in the broader security orchestration and threat intelligence platform market.

Source assisted: This briefing began from a discovered source item from SiliconANGLE. Open the original source.
How SignalDesk reports: feeds and outside sources are used for discovery. Public briefings are edited to add context, buyer relevance and attribution before they are published. Read the standards

Related briefings