Neustar UltraThreat Feeds

Additional Info

CompanyNeustar
Websitehome.neustar
Company size (employees)1,000 to 4,999
Type of solutionService

Overview

UltraThreat Feeds is Neustar’s newest service that provides its enterprise customers with access to real-time threat data to help them better identify cyber threats as they evolve. Designed by Neustar’s renowned security experts and leading academic researchers, the service –unique to Neustar – enables security and threat intelligence teams of all sizes to access threat feeds based on analysis and observations curated from Neustar’s expansive DNS, OneID and IP decisioning data. Incorporating proprietary data derived from Neustar’s Security Portfolio & OneID identity resolution platform, UltraThreat Feeds can be ingested into a client’s existing platform to deliver superior threat data and provide valuable insights to unique and developing threats in near real-time. Data breaches and cyber attacks are becoming more costly every year and organizations are investing heavily into threat intelligence solutions to better defend themselves. Neustar UltraThreat Feeds helps enterprises adopt a more proactive security stance which moves in real time.

How we are different

• Neustar’s UltraThreat Feeds enable Neustar customers to identify malicious Domain Generation Algorithms (DGAs), suspicious DNS tunneling attempts, newly observed domains, domain updates, and domain spoofing.
• Neustar’s UltraThreat Feeds service has an advantage over competitors, thanks to the availability of its own unique data assets, including DNS data exhaust collected from the more than 100 billion queries received from 30 globally distributed nodes every day and supplemented by the IP address intelligence and analytics processed across Neustar’s product suite. Combined with behavioral analysis and pattern-based research, this advantage enables Neustar to derive truly unique insights into malicious activity.
• UltraThreat Feeds provides curated data feeds reflecting the most relevant information and incorporating deep context for issues key to a customer’s network or system. The service can be integrated into an existing analytics platform to deliver superior threat data and provide valuable insights to unique and developing threats in near real-time.