Skip to main content

Cyware Threat Intelligence eXchange

Cyware Cloud-Exclusive Features

The Intel Exchange application deployed on Cyware Cloud includes unique features that are not available for on-premise deployments by default. However, by meeting specific requirements, on-premise deployments can also access certain features exclusive to the cloud.

The following table consists of a list of Cyware Cloud-exclusive features and the requirements for on-premise support.

Note

Features not mentioned in the following table are supported on both Cyware Cloud and on-premise deployments.

Feature

Description

On-Premise Support

Requirements for On-Premise Support

Browser Extension

Cyware Threat Intel Crawler is a web browser extension that enables the extraction of STIX domain objects and the creation of intel from parsed information. For more information, see Browser Extensions.

Yes

  • Enable installation and execution of the browser extension directly within the browser.

  • Add the URLs that are required to ensure bi-directional connectivity to your Allow List. Contact Cyware support for the list of URLs.

Sandbox

Sandbox is a malware analysis tool that provides an isolated testing environment to execute potentially malicious files and URL requests. For more information, see Malware Analysis using Sandbox.

Yes

To utilize the default storage of sandbox to store suspicious files and the sandbox analysis reports, add Cyware's AWS S3 cloud storage link to your Allow List. To get the cloud storage link, contact Cyware support.

To utilize a different AWS S3 cloud storage, add the cloud storage link to your Allow List.

Threat Defender Library

The Threat Defender Library serves as a repository for threat intelligence content, housing information, and files crucial for threat hunting and defense. For more information, see Threat Defender Library.

No

Not Applicable

Hub and Spoke

Hub and Spoke is a threat intelligence sharing model where one organization functions as the central information hub to share threat intel and coordinate information exchange between spokes and partner organizations. This model enables a central, formal, and secure exchange of information with its spokes and subsidiaries. For more information, see Hub and Spoke.

No

Not Applicable