ThreatQuotient Selected By Comcast To Support Cybersecurity Operations
May 2022 by Marc Jacob
ThreatQuotient™ announced that Comcast has selected the ThreatQ Platform and ThreatQ Investigations to meet their cybersecurity operations needs.
Following an extensive and competitive selection process, including a four month proof of concept (POC), ThreatQuotient’s technology solutions ultimately proved to solve a key challenge facing Comcast’s Cybersecurity Operations Center (CSOC): the need to make security data actionable across multiple teams and complex use cases, including priority threat actor risk mitigation, threat hunting, threat detection engineering, incident response and forensics, and risk-based vulnerability management.
As a result of using the ThreatQ Platform with the DataLinq Engine and ThreatQ Investigations, Comcast’s CSOC achieved the following outcomes:
Prioritise and collaborate to drive efficiencies
Comcast’s cybersecurity teams are now sharing data and learnings in a highly efficient, heavily automated manner. Sharing contextualised intelligence is a force multiplier. Teams can focus on relevant, high-priority issues, so they can make better decisions and take the right actions faster.
Capture more value from tools and teams
The ThreatQ Platform’s support for bi-directional integrations with nearly 300 different tools, customised dashboards and integrated views, allows teams to share actionable intelligence within their workflows using tools they are accustomed to. Comcast Cybersecurity gets more value from their existing tools and teams, while strengthening security posture and can add more tools to scale as needed.
Support complex use cases
Comcast teams can address multiple, complex use cases. In addition to sharing actionable intelligence and enabling collaboration, the ThreatQ Platform and ThreatQ Investigations helps automate repetitive, low-risk, time-consuming tasks. This empowers analysts, threat hunters and engineers to take the lead on complex, time-sensitive investigations, hunts, forensic analysis and incident response.