Threat Stream API Offers Security Through Real-Time Access to Actionable Intelligence

Eric Carter, October 8th, 2013

Threat StreamThreat Stream, SaaS-based cyber threat intelligence platform, offers its real-time stream of actionable intelligence to developers through the Threat Stream API. Threat Stream’s big data security driven analytics creates an actionable, context rich stream of intelligence that meets the needs of government and enterprise security operations. Machine learning and sophisticated algorithms reduce false-positives and give users world class security capabilities.

Threat Stream was created in 2011 with the goal of combining data science with actionable threat intelligence. With data and security industry veterans sitting as board members and employees, Threat Stream is reimagining the capacity for proactive security. A crowdsourced security analytics platform protects against malware, APT, zero day exploits, data compromise, fraud, phishing, espionage, and more.

The Threat Stream API uses HTTP and returns calls in a JSON data format. The API delivers API access to the real-time security data stream. Both free access or more advanced, paid for enterprise grade access is available. Threat Stream uses open source intelligence and machine learning for the most up to date data. For more information, visit the Threat Stream homepage.

Cyber threats have taken front stage right alongside terrorism in the modern day security discussion. Traditionally a reactive space, Threat Stream has used open source data gathering and forward thinking analytics to proactively approach security considerations. Its API approach to security enables developers to seamlessly integrate with existing applications and workflows.

Both comments and pings are currently closed.

Comments are closed.

Follow the PW team on Twitter

APIs, mashups and code. Because the world's your programmable oyster.

John Musser
Founder, ProgrammableWeb

Adam DuVander
Executive Editor, ProgrammableWeb. Author, Map Scripting 101. Lover, APIs.