- 10 Aug 2022
- 1 Minute to read
-
Print
-
DarkLight
RH-ISAC Integration Installation and Configuration Guide
- Updated on 10 Aug 2022
- 1 Minute to read
-
Print
-
DarkLight
The ThreatConnect® integration with the Retail and Hospitality Information Sharing and Analysis Center (RH-ISAC) ingests Indicators from the TruSTAR API into ThreatConnect, enabling analysts to access the context and awareness of ThreatConnect on industry-specific Indicators, as well as take action quickly and effectively. The integration ingests Vetted and Non-Vetted Enclaves as separate feeds in ThreatConnect. The Vetted Source contains Indicators (Address, File, Host, and URL) only, while the Non-Vetted Source contains Reports and Indicators. Once a vetted Indicator is in ThreatConnect, it is easy to see the connection between the Indicator and the original report from which it was collected.
ThreatConnect® is a registered trademark of ThreatConnect, Inc.