Accenture acquired iDefense IntelGraph in 2017. Accenture iDefense IntelGraph was integrated by Mindflow to enable users to combat threats faster.
Accenture iDefense Overview
What is Accenture iDefense?
iDefense IntelGraph is part of Accenture’s cyberdefense offering and offers a range of services, from threat intelligence databases to threat-hunting and incident-response services. All in all, it is a threat intelligence platform that allows analysts to contextualize malware through the visualization of the relationship between malicious actors, the tools they use, and their target vulnerabilities.
Recent data shows that it can take over several months to detect a potential threat, and there will be a long time before any breach is resolved. This means that security teams often have to deal with more than they can handle on their own, so it’s worth considering outsourcing some of your work.
iDefense is an interactive graph that provides you with a graphical overview of different hackers, their tools, and the underlying vulnerabilities they exploit. This way, it offers unmatched contextual linkages and visualization capabilities that empower analysts with the data they need to make timely decisions.
Who can use iDefense?
iDefense IntelGraph is designed to allow analysts to conduct a real-time security analysis. To that end, it relies on a collection of proprietary threat intelligence data to run its distinctive analysis and power its APIs.
Analysts rely on the platform to gather relevant and actionable security insights in a timely manner.
By integrating with iDefense IntelGraph, Mindflow allows its users to automate the threat intelligence analysis through iDefense IOCs collection from its platform.
Accenture iDefense benefits
Actionable threat intelligence
The solution focuses on delivering streamlined data to enable real-time and actionable threat intelligence to help analysts make better decisions faster.
Contextualization of the threat
Dynamic analysis of the malware, vulnerabilities, threat actors, domains, phishing emails, and targets allows for enhanced threat contextualization.
Single source of truth
The platform provides a single source of truth to analyze malware and IOCs, which helps SecOps to increase the ROI of investment in threat intelligence tools.
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.