Cyware Cloud-Exclusive Features
The Intel Exchange application deployed on Cyware Cloud includes unique features that are not available for on-premise deployments by default. However, by meeting specific requirements, on-premise deployments can also access certain features exclusive to the cloud.
The following table consists of a list of Cyware Cloud-exclusive features and the requirements for on-premise support.
Note
Features not mentioned in the following table are supported on both Cyware Cloud and on-premise deployments.
Feature | Description | On-Premise Support | Requirements for On-Premise Support |
|---|---|---|---|
Browser Extension |
| No |
|
Cyware Sandbox | Cyware Sandbox enables you to safely execute suspicious artifacts in a controlled environment to detect malicious behavior, investigate unknown threats, and generate actionable Indicators of Compromise (IOCs). For more information, see Cyware Sandbox. | No | To utilize the default storage of the sandbox to store suspicious files and the sandbox analysis reports, add Cyware's AWS S3 cloud storage link to your Allow List. To get the cloud storage link, contact Cyware support. To utilize a different AWS S3 cloud storage, add the cloud storage link to your Allow List. |
Exposure Management | Exposure Management gives you a centralized view of your organization’s exposure to external threats and compromised credentials, helping you detect, assess, and respond faster. For more information, see Exposure Management. | No | Not Applicable |
Cyware Intelligence Hub | Cyware Intelligence Hub provides a centralized platform to collect, correlate, enrich, and operationalize threat intelligence from multiple sources, enabling security teams to gain contextual insights, prioritize relevant threats, and respond faster with confidence. For more information, see Cyware Intelligence Hub. | No | Not Applicable |
Cyware AI Features | Cyware AI Features enhance analyst productivity with AI-powered capabilities that accelerate intelligence analysis and creation.
| No | Not Applicable |
Allowed Indicators List | Enables you to define and manage a trusted set of indicators that are permitted within your environment, helping reduce false positives and improve the accuracy of threat processing workflows. For more information, see Allowed Indicator List. | No | Not Applicable |
Intel Operations (Cyware Orchestrate) | Intel Operations (Cyware Orchestrate) enables you to centralize threat intelligence from multiple sources and automate security response through orchestration and workflow automation. For more information, see Intel Operations. | No | Not Applicable |
Threat Defender Library | The Threat Defender Library serves as a repository for threat intelligence content, housing information and files crucial for threat hunting and defense. For more information, see Threat Defender Library. | No | Not Applicable |
Hub and Spoke | Hub and Spoke is a threat intelligence sharing model where one organization functions as the central information hub to share threat intel and coordinate information exchange between spokes and partner organizations. This model enables a central, formal, and secure exchange of information with its spokes and subsidiaries. For more information, see Hub and Spoke. | No | Not Applicable |