Jonathan Zhang, CEOIn today’s digitalized world where cyberattackers are growing stronger with access to sophisticated technologies, enterprises are exposed to a broadening spectrum of security challenges. With an aim to take the modern enterprises one step ahead of the cyberattackers, Threat Intelligence Platform LLC—a subsidiary of Whois API Inc.—provides APIs and tools that augment the functionality of the existing security solutions. These APIs garner insights from Whois data to fill the information gaps in the existing security solutions. “Our tools and APIs can perform exceptionally well as the building blocks of modern security product ecosystem, be it security information and event management (SIEM) systems, data loss prevention tools, threat intelligence platforms, or anti-malware solutions,” says Jonathan Zhang, CEO of Threat Intelligence Platform, LLC. “In addition, third-party security solution providers can consolidate security functionalities and identify cyberattackers using our solutions.”
Such is the proficiency of Threat Intelligence Platform, LLC that institutions like Institute of Electrical and Electronics Engineers (IEEE) and technology behemoth such as IBM have availed the company’s APIs to strengthen their security posture. Zhang proudly mentions that IEEE is using their solution to automatically check for the expiration of its broad set of domain names. Explaining their value delivery to IBM, Zhang mentions that IBM’s search for a reliable data provider for their security systems ended with taking Threat Intelligence Platform on board. The company’s APIs improved IBM’s QRadar SIEM solution to collect DNS transactions and correlate the information with Whois data to detect fraud and suspicious domains. The improved QRadar SIEM solution helped IBM analyze raw data and transform the same into a well-structured format to be read by QRadar’s big data security extension. “We monitor the status of present domain names through reverse queries and investigate their internal connections to keep an eye on cybercrimes and help enterprises protect their brands, and take legal actions against cyberattackers,” explains Zhang.
Threat Intelligence Platform differentiates itself with their ability to empower organizations to anticipate threats in advance and identify the exact geographic location of a cyberattacker. This feat is achieved through the intelligent database of domain names that the company has built by tracking various generic and country codes top-level domains.
Comprising comprehensive and accurate data, the database contains historical as well as real-time Whois data records which are a trustable source of information to know who is behind domain names, detect social engineering attacks, and take actions against scammers.
Our tools and APIs can perform exceptionally well as the building blocks of modern security product ecosystem, be it security information and event management (SIEM) systems, data loss prevention tools, threat intelligence platforms, or anti-malware solutions
Threat Intelligence Platform collects Whois data from the most reliable data sources and integrates the same with its centralized databases. CIOs and security professionals can explore Threat Intelligence Platform’s database for effective decision making. They can use the database in tandem with the company’s collection of APIs for domain availability, reverse Whois, brand alert, registrant alert, DNS lookup, reputation scoring, and IP geo-location. The APIs can be used in various combinations or individually to detect phishing, avoid transaction frauds, protect IPs, and investigate cybercrime. With apt solutions for cybersecurity, domain availability, brand protection, marketing research, registrar outsourcing, law enforcement, fraud detection, and investment funds and banking, Threat Intelligence Platform is playing a leading role in solving enterprise security challenges.
Currently serving more than 50,000 clients, Threat Intelligence Platform is now looking forward to enhancing its offerings by allowing enterprises to conduct threat intelligence analysis of targets, detect flaws in client’s and third party’s system configuration, provide online reports to identify weak spots, and build more effective threat intelligence APIs.