Skip to main content

Cyware Cloud-Exclusive Features

The Intel Exchange application deployed on Cyware Cloud includes unique features that are not available for on-premise deployments by default. However, by meeting specific requirements, on-premise deployments can also access certain features exclusive to the cloud.

The following table consists of a list of Cyware Cloud-exclusive features and the requirements for on-premise support.

Note

Features not mentioned in the following table are supported on both Cyware Cloud and on-premise deployments.

Feature

Description

On-Premise Support

Requirements for On-Premise Support

Browser Extension

  • Cyware Threat Intel Crawler (Legacy Version) is a web browser extension that extracts STIX domain objects and allows you to create intel from parsed information. For details, see Browser Extensions.

  • Cyware Advanced Threat Intel Crawler (Latest Version) is an enhanced web browser extension that parses threat data from web content and helps you quickly create intel from extracted information. For more information, see Browser Extension.

No

  • Enable installation and execution of the browser extension directly within the browser.

  • Add the URLs that are required to ensure bi-directional connectivity to your Allow List. Contact Cyware support for the list of URLs.

Cyware Sandbox

Cyware Sandbox enables you to safely execute suspicious artifacts in a controlled environment to detect malicious behavior, investigate unknown threats, and generate actionable Indicators of Compromise (IOCs). For more information, see Cyware Sandbox.

No

To utilize the default storage of the sandbox to store suspicious files and the sandbox analysis reports, add Cyware's AWS S3 cloud storage link to your Allow List. To get the cloud storage link, contact Cyware support.

To utilize a different AWS S3 cloud storage, add the cloud storage link to your Allow List.

Exposure Management

Exposure Management gives you a centralized view of your organization’s exposure to external threats and compromised credentials, helping you detect, assess, and respond faster. For more information, see Exposure Management.

No

Not Applicable

Cyware Intelligence Hub

Cyware Intelligence Hub provides a centralized platform to collect, correlate, enrich, and operationalize threat intelligence from multiple sources, enabling security teams to gain contextual insights, prioritize relevant threats, and respond faster with confidence. For more information, see Cyware Intelligence Hub.

No

Not Applicable

Cyware AI Features

Cyware AI Features enhance analyst productivity with AI-powered capabilities that accelerate intelligence analysis and creation.

  • Threat Data AI Summary: Automatically generates concise, contextual summaries of threat intelligence data to help analysts quickly understand key insights. For more information, see Generate AI Summary.

  • Quick Add Intel: Uses AI to parse unstructured threat data and convert it into structured intelligence objects for faster ingestion and action. For more information, see Quick Add Intel.

No

Not Applicable

Allowed Indicators List

Enables you to define and manage a trusted set of indicators that are permitted within your environment, helping reduce false positives and improve the accuracy of threat processing workflows. For more information, see Allowed Indicator List.

No

Not Applicable

Intel Operations (Cyware Orchestrate)

Intel Operations (Cyware Orchestrate) enables you to centralize threat intelligence from multiple sources and automate security response through orchestration and workflow automation. For more information, see Intel Operations.

No

Not Applicable

Threat Defender Library

The Threat Defender Library serves as a repository for threat intelligence content, housing information and files crucial for threat hunting and defense. For more information, see Threat Defender Library.

No

Not Applicable

Hub and Spoke

Hub and Spoke is a threat intelligence sharing model where one organization functions as the central information hub to share threat intel and coordinate information exchange between spokes and partner organizations. This model enables a central, formal, and secure exchange of information with its spokes and subsidiaries. For more information, see Hub and Spoke.

No

Not Applicable