{"id":12318,"date":"2018-11-22T09:01:00","date_gmt":"2018-11-22T14:01:00","guid":{"rendered":"https:\/\/me-en.kaspersky.com\/blog\/?p=12318"},"modified":"2022-02-24T14:48:20","modified_gmt":"2022-02-24T10:48:20","slug":"threat-intelligence-forrester-wave","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/threat-intelligence-forrester-wave\/12318\/","title":{"rendered":"How to choose the right threat intelligence services"},"content":{"rendered":"<p>There was a time, in the not too distant past when the choice of a threat intelligence service was restricted to a handful of providers. We don\u2019t live in that world anymore. Recently, the increasing complexity of threats in the modern cyber landscape have given rise to a plethora of threat intelligence vendors, each offering a host of different services. An extensive and competitive market with innumerable, byzantine options can make choosing the right solution for your organization\u2019s needs, both confusing and extremely frustrating. That is what Forrester seeks to address through a recently released report on external threat intelligence, titled <em>The Forrester New Wave: External Threat Intelligence Services, Q3 2018Forrester Wave methodology guide) used in this case simplifies the process for readers to shortlist vendors based on performance and their own custom requirements. The firm evaluated Kaspersky Lab to be a \u201cStrong Performer\u201d with six \u201cDifferentiated\u201d offerings (among the most received by evaluated vendors).<\/em><\/p>\n<div id=\"attachment_24742\" style=\"width: 381px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2018\/11\/22180232\/threat-intelligence-forrester-wave-1.png\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-24742\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2018\/11\/22180232\/threat-intelligence-forrester-wave-1.png\" alt=\"Source: The Forrester New Wave\u2122: External Threat Intelligence Services, Q3 2018\" width=\"371\" height=\"164\" class=\"size-full wp-image-12315\"><\/a><p id=\"caption-attachment-24742\" class=\"wp-caption-text\">Source: The Forrester New Wave\u2122: External Threat Intelligence Services, Q3 2018<\/p><\/div>\n<p>Forrester calls Kaspersky Lab\u2019s ability to collect and analyze information to be \u201cexceptional\u201d in the report. The firm also recognizes the capabilities of the GReAT (Kaspersky Global Research and Analysis Team) which is a specialized team of experts conducting research in more than 18 languages. Forrester acknowledges the need to have a broader perspective that is independent of just western sources, calling Kaspersky Lab to be the \u201cbest\u201d for nation-state intel that is not necessarily aligned with western governments. Finally, Kaspersky Lab\u2019s clients greatly appreciate the company\u2019s global reach with the ability to monitor and locate threats in all parts of the world.<\/p>\n<p>With threats becoming increasingly complex and malicious, it is imperative that organizations arm themselves with a broad array of countermeasures to deflect impending attacks.  Choosing a threat intelligence vendor in 2018 shouldn\u2019t require a herculean effort, especially when resources to identify them are widely available. The Forrester report is among the best available resources for security professionals to analyze vendor capabilities across a wide variety of services, in order to make informed decisions. There may be no silver bullet in cyber-security, but when it comes to combating zero-days and APTs, a reliable threat intelligence service can make all the difference.<\/p>\n<p>For more information about our services, please visit <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/enterprise-security\/threat-intelligence-subscription?u&amp;utm_source=kdaily&amp;utm_medium=blog&amp;utm_campaign=gl_TIP_organic&amp;utm_content=link&amp;utm_term=gl_kdaily_organic_link_blog_TIP\" rel=\"noopener noreferrer nofollow\">Kaspersky Threat Intelligence webpage<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Resources for security professionals to analyze vendor capabilities across a wide variety of threat intelligence services.<\/p>\n","protected":false},"author":2501,"featured_media":12313,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1318,1917],"tags":[1956,1957,1552],"class_list":{"0":"post-12318","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-analysts","10":"tag-forrester","11":"tag-threat-intelligence"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/threat-intelligence-forrester-wave\/12318\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/threat-intelligence-forrester-wave\/14710\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/threat-intelligence-forrester-wave\/16622\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/threat-intelligence-forrester-wave\/14816\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/threat-intelligence-forrester-wave\/13716\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/threat-intelligence-forrester-wave\/16632\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/threat-intelligence-forrester-wave\/21809\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/threat-intelligence-forrester-wave\/5442\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/threat-intelligence-forrester-wave\/24740\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/threat-intelligence-forrester-wave\/10076\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/threat-intelligence-forrester-wave\/18147\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/threat-intelligence-forrester-wave\/22060\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/threat-intelligence-forrester-wave\/17701\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/threat-intelligence-forrester-wave\/21559\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/threat-intelligence-forrester-wave\/21557\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/threat-intelligence\/","name":"threat intelligence"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/12318","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2501"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=12318"}],"version-history":[{"count":8,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/12318\/revisions"}],"predecessor-version":[{"id":19406,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/12318\/revisions\/19406"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/12313"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=12318"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=12318"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=12318"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}