RH-ISAC Integration Installation and Configuration Guide
  • 10 Aug 2022
  • 1 Minute to read
  • Dark
    Light

RH-ISAC Integration Installation and Configuration Guide

  • Dark
    Light

Article Summary

The ThreatConnect® integration with the Retail and Hospitality Information Sharing and Analysis Center (RH-ISAC) ingests Indicators from the TruSTAR API into ThreatConnect, enabling analysts to access the context and awareness of ThreatConnect on industry-specific Indicators, as well as take action quickly and effectively. The integration ingests Vetted and Non-Vetted Enclaves as separate feeds in ThreatConnect. The Vetted Source contains Indicators (Address, File, Host, and URL) only, while the Non-Vetted Source contains Reports and Indicators. Once a vetted Indicator is in ThreatConnect, it is easy to see the connection between the Indicator and the original report from which it was collected.

 

Your browser does not support PDF.click here to download

 


ThreatConnect® is a registered trademark of ThreatConnect, Inc.

Attachments

Was this article helpful?