Overview:

QuoLab Integration Partners

back to our solution
  • Threat Intelligence Feed
    Alien Vault
    Threat Intelligence Feed

    The AlienVault Open Threat Exchange (OTX) is the world’s most authoritative open threat information sharing and analysis network. OTX provides access to a global community of threat researchers and security professionals, with more than 50,000 participants in 140 countries, who contribute over four million threat indicators daily. OTX allows anyone in the security community to actively discuss, research, validate, and share the latest threat data, trends, and techniques.

    Close
  • BinaryNinja
    BinaryNinja
    BinaryNinja

    Binary Ninja is a reversing platform.

    Close
  • Threat Intelligence Feeds
    CertStream
    Threat Intelligence Feeds

    Receive data from the Certificate Transparency Log (CTL) network in real time. CTL provides a log for storing a cryptographically-verifiable immutable list of issued certificates from a central authority.

    Close
  • Product Integration
    Cuckoo
    Product Integration

    Cuckoo Sandbox is the leading open source automated malware analysis system. You can throw any suspicious file at it and in a matter of minutes Cuckoo will provide a detailed report outlining the behavior of the file when executed inside a realistic but isolated environment.

    Close
  • Product Integration
    LastLine
    Product Integration

    Lastline Analyst™ provides your threat analysts and incident response teams with the advanced malware inspection and isolation environment they need to safely execute advanced malware samples and understand their behavior. Your security team gets the benefit of the Lastline team’s years of research on evasive malware. Lastline Analyst puts the combined expertise of our internationally recognized experts on advanced malware at your team’s fingertips.

    Close
  • Product Integration
    LogPoint
    Product Integration

    LogPoint is a Security Information and Event Management (SIEM) solution, extracting existing log data and reporting on all critical incidents.

    Close
  • Threat Analysis Tools
    Maltego
    Threat Analysis Tools

    Maltego is a popular commercial tool used by Threat Intelligence Analysts, running as a GUI application on desktops, that is used to gather, interrogate and visualize data.

    Close
  • Threat Intelligence Feeds
    MaxMind
    Threat Intelligence Feeds

    MaxMind's GeoIP2 Databases provide IP intelligence data for high volume, low latency environments. The GeoIP2 Databases identify the location and other characteristics of internet users for a wide range of applications including content personalization, security, fraud detection, traffic analysis, compliance, geo-targeting, geo-fencing, digital rights management, and more.

    Close
  • Product Integration
    McAfee
    Product Integration

    McAfee Enterprise Security Manager is a security information and event management (SIEM) solution that delivers actionable intelligence and integrations to prioritize, investigate, and respond to threats.

    Close
  • Threat Intelligence Feeds
    MISP
    Threat Intelligence Feeds

    The MISP threat sharing platform is a free and open source software helping information sharing of threat intelligence including cyber security indicators.

    Close
  • Threat Intelligence
    National Software Reference Library (NSRL)
    Threat Intelligence

    The National Software Reference Library (NSRL) is designed to collect software from various sources and incorporate file profiles computed from this software into a Reference Data Set (RDS) of information. The RDS can be used by law enforcement, government, and industry organizations to review files on a computer by matching file profiles in the RDS.

    Close
  • Product Integration
    QRadar
    Product Integration

    QRadar is a commercial SIEM platform by IBM.

    Close
  • Threat Intelligence Feeds
    Reversing Labs
    Threat Intelligence Feeds

    Undetected malware lurks in files across organizations, unknown and unseen by current security tools. ReversingLabs provides the only solution for comprehensive file inspection at enterprise scale for early identification of threats across email, web and storage. The solutions automate real-time inspection using unique technology for deep analysis and authoritative file Intelligence service for global awareness.

    Close
  • RSS
    RSS
    RSS

    RSS s a type of web feed which allows users and applications to access updates to online content in a standardized, computer-readable format.

    Close
  • Threat Intelligence
    SHODAN
    Threat Intelligence

    Shodan is a search engine that lets the user find specific types of computers (webcams, routers, servers, etc.) connected to the internet using a variety of filters. Some have also described it as a search engine of service banners, which are metadata that the server sends back to the client. This can be information about the server software, what options the service supports, a welcome message or anything else that the client can find out before interacting with the server.

    Close
  • Product Integration
    Splunk
    Product Integration

    Splunk Enterprise Security (ES) is an analytics-driven SIEM made of five distinct frameworks that can be leveraged independently to meet a wide range of security use cases including compliance, application security, incident management, advanced threat detection, real-time monitoring and more.

    Close
  • Threat Intelligence Feeds
    STIX
    Threat Intelligence Feeds

    STIX TAXII or Structured Threat Information Expression and Trusted Automated eXchange of Indicator Information are community-supported specifications designed to enable automated information sharing for cybersecurity situational awareness, real-time network defense, and complex threat analysis.

    Close
  • Threat Intelligence Feeds
    TAXII
    Threat Intelligence Feeds

    STIX TAXII or Structured Threat Information Expression and Trusted Automated eXchange of Indicator Information are community-supported specifications designed to enable automated information sharing for cybersecurity situational awareness, real-time network defense, and complex threat analysis.

    Close
  • TorProject
    TorProject
    TorProject

    Tor is free and open-source software for enabling anonymous communication

    Close
  • Product Integration
    VirusTotal
    Product Integration

    Analyze suspicious files and URLs to detect types of malware, automatically share them with the security community.

    Close
  • Product Integration
    VMRay
    Product Integration

    VMRay is leading change in the Automated Malware Analysis market with its revolutionary approach to threat analysis and detection. It provides an innovative solution that provides full visibility into malware behavior, enabling security teams to detect even the most evasive malware early and in a fully automated manner.

    Close
Close
Incident Hotline
+49 69 33 99 86 34

Cyberattacks require immediate action. That's why we are always in reach. Round the clock, round the globe. We strive to find the best possible decision together with you to ensure the best-possible damage prevention. Give us a call – no matter the issue!