{"id":24502,"date":"2022-10-04T12:05:10","date_gmt":"2022-10-04T10:05:10","guid":{"rendered":"https:\/\/www.ikarussecurity.com\/managed-it-ot-security-solutions\/ikarus-threat-intelligence-platform\/"},"modified":"2026-03-25T19:45:55","modified_gmt":"2026-03-25T18:45:55","slug":"ikarus-threat-intelligence-platform","status":"publish","type":"page","link":"https:\/\/www.ikarussecurity.com\/en\/managed-it-ot-security-solutions\/ikarus-threat-intelligence-platform\/","title":{"rendered":"IKARUS threat.intelligence.platform"},"content":{"rendered":"<div id='av-layout-grid-1'  class='av-layout-grid-container av-junymveb-810ad1ce854c84e404d415892b37fc36 entry-content-wrapper main_color av-flex-cells  avia-builder-el-0  el_before_av_layout_row  avia-builder-el-first   container_wrap fullsize'  >\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-junyesco-5c80be9bd21b7421b7b36df1031918a9\">\n.flex_cell.av-junyesco-5c80be9bd21b7421b7b36df1031918a9{\nvertical-align:middle;\nheight:400px;\nmin-height:400px;\nbackground:url(https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2022\/09\/cyber-treat-intelligence-3.jpg) 0% 0% no-repeat scroll #ef5737;\n}\n.responsive #top #wrap_all .flex_cell.av-junyesco-5c80be9bd21b7421b7b36df1031918a9{\npadding:0px 0px 0px 0px !important;\n}\n<\/style>\n<div class='flex_cell av-junyesco-5c80be9bd21b7421b7b36df1031918a9 av-gridrow-cell av_one_half no_margin  avia-builder-el-1  el_before_av_cell_one_half  avia-builder-el-first  content-align-middle av-zero-padding avia-full-stretch'  ><div class='flex_cell_inner'><\/div><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-junyrmwc-31a561d8e9a544598fcc7c5e8941167a\">\n.flex_cell.av-junyrmwc-31a561d8e9a544598fcc7c5e8941167a{\nvertical-align:top;\nheight:400px;\nmin-height:400px;\nbackground-color:#d4300f;\n}\n.responsive #top #wrap_all .flex_cell.av-junyrmwc-31a561d8e9a544598fcc7c5e8941167a{\npadding:60px 30px 60px 30px !important;\n}\n<\/style>\n<div class='flex_cell av-junyrmwc-31a561d8e9a544598fcc7c5e8941167a av-gridrow-cell av_one_half no_margin  avia-builder-el-2  el_after_av_cell_one_half  avia-builder-el-last  content-align-top'  ><div class='flex_cell_inner'><p>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-ko8kqdu0-52d7cad92b65372d637b9f21b1a2bb40\">\n#top .av-special-heading.av-ko8kqdu0-52d7cad92b65372d637b9f21b1a2bb40{\npadding-bottom:25px;\ncolor:#ffffff;\nfont-size:34px;\n}\nbody .av-special-heading.av-ko8kqdu0-52d7cad92b65372d637b9f21b1a2bb40 .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n#top #wrap_all .av-special-heading.av-ko8kqdu0-52d7cad92b65372d637b9f21b1a2bb40 .av-special-heading-tag{\nfont-size:34px;\n}\n.av-special-heading.av-ko8kqdu0-52d7cad92b65372d637b9f21b1a2bb40 .special-heading-inner-border{\nborder-color:#ffffff;\n}\n.av-special-heading.av-ko8kqdu0-52d7cad92b65372d637b9f21b1a2bb40 .av-subheading{\nfont-size:15px;\n}\n\n@media only screen and (min-width: 480px) and (max-width: 767px){ \n#top #wrap_all .av-special-heading.av-ko8kqdu0-52d7cad92b65372d637b9f21b1a2bb40 .av-special-heading-tag{\nfont-size:0.8em;\n}\n}\n\n@media only screen and (max-width: 479px){ \n#top #wrap_all .av-special-heading.av-ko8kqdu0-52d7cad92b65372d637b9f21b1a2bb40 .av-special-heading-tag{\nfont-size:0.8em;\n}\n}\n<\/style>\n<div  class='av-special-heading av-ko8kqdu0-52d7cad92b65372d637b9f21b1a2bb40 av-special-heading-h1 custom-color-heading blockquote modern-quote  avia-builder-el-3  el_before_av_textblock  avia-builder-el-first  av-inherit-size av-linked-heading'><h1 class='av-special-heading-tag '  itemprop=\"headline\"  >Cyber Threat Intelligence: Threat information, background knowledge and analytics<\/h1><div class='av_custom_color av-subheading av-subheading_below'><p>IKARUS threat.intelligence.platform<\/p>\n<\/div><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-jyzx0kqa-8b0988d736add2861771c640b9d40cd3\">\n#top .av_textblock_section.av-jyzx0kqa-8b0988d736add2861771c640b9d40cd3 .avia_textblock{\ncolor:#ffffff;\n}\n<\/style>\n<section  class='av_textblock_section av-jyzx0kqa-8b0988d736add2861771c640b9d40cd3 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock av_inherit_color'  itemprop=\"text\" ><p>\u201cIf you know the enemy and know yourself, you need not fear the result of a hundred battles. If you know yourself but not the enemy, for every victory gained you will also suffer a defeat. If you know neither the enemy nor yourself, you will succumb in every battle.\u201d \u2015 Sun Tzu, The Art of War<\/p>\n<p>Cyber threat intelligence is the art of assessing threats from cyberspace, taking into account one&#8217;s own situation. To do this, you need up-to-date, prioritised information on threats that are relevant to your organisation and for which you need to be prepared. This data comes from many sources and can be used most efficiently if it is linked, deduplicated and normalised. IKARUS combines these disciplines with the ability to use the information in an operational environment.<\/p>\n<\/div><\/section><\/p>\n<\/div><\/div>\n<\/div>\n<div id='av-layout-grid-2'  class='av-layout-grid-container av-junyy33y-ebc4019e7b6877f5936d4d5958e59ead entry-content-wrapper main_color av-flex-cells  avia-builder-el-5  el_after_av_layout_row  el_before_av_layout_row  grid-row-not-first  container_wrap fullsize'  >\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-junyw8vu-4853268eebab2336dfbb5674b206345b\">\n.flex_cell.av-junyw8vu-4853268eebab2336dfbb5674b206345b{\nvertical-align:top;\nbackground-color:#d4300f;\n}\n.responsive #top #wrap_all .flex_cell.av-junyw8vu-4853268eebab2336dfbb5674b206345b{\npadding:9px 0px 0px 0px !important;\n}\n<\/style>\n<div class='flex_cell av-junyw8vu-4853268eebab2336dfbb5674b206345b av-gridrow-cell av_one_half no_margin av-hide-on-mobile  avia-builder-el-6  el_before_av_cell_one_half  avia-builder-el-first  content-align-top'  ><div class='flex_cell_inner'><\/div><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-junywu9f-5b165b798071c88cf1c9b8f11bd841b6\">\n.flex_cell.av-junywu9f-5b165b798071c88cf1c9b8f11bd841b6{\nvertical-align:top;\nbackground-color:#ef5737;\n}\n.responsive #top #wrap_all .flex_cell.av-junywu9f-5b165b798071c88cf1c9b8f11bd841b6{\npadding:9px 0px 0px 0px !important;\n}\n<\/style>\n<div class='flex_cell av-junywu9f-5b165b798071c88cf1c9b8f11bd841b6 av-gridrow-cell av_one_half no_margin  avia-builder-el-7  el_after_av_cell_one_half  avia-builder-el-last  content-align-top'  ><div class='flex_cell_inner'><\/div><\/div>\n<\/div>\n<div id='av-layout-grid-3'  class='av-layout-grid-container av-rr8gnv-2a82409bb660cd53e3b737094bcdc1fe entry-content-wrapper main_color av-flex-cells  avia-builder-el-8  el_after_av_layout_row  el_before_av_layout_row  grid-row-not-first  container_wrap fullsize'  >\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-3z0k63-9dd1a15f474a2deb9920b330ed818934\">\n.flex_cell.av-3z0k63-9dd1a15f474a2deb9920b330ed818934{\nvertical-align:top;\n}\n.responsive #top #wrap_all .flex_cell.av-3z0k63-9dd1a15f474a2deb9920b330ed818934{\npadding:30px 30px 30px 30px !important;\n}\n<\/style>\n<div class='flex_cell av-3z0k63-9dd1a15f474a2deb9920b330ed818934 av-gridrow-cell av_one_half no_margin  avia-builder-el-9  el_before_av_cell_one_half  avia-builder-el-first  content-align-top'  ><div class='flex_cell_inner'><section  class='av_textblock_section av-jyzx0kqa-14-8e7f1cbd1978d6b4215736f022646599 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h2>IKARUS Threat Intelligence Platform for threat informationen, case management, and SOAR<\/h2>\n<p>The <strong>IKARUS threat.intelligence.platform<\/strong> (IKARUS TIP) offers three tools for your cyber defense strategy: threat information, case management and SOAR. Both the flexible platform concept of the <strong>IKARUS threat.intelligence.platform<\/strong> and the quality of the attributed and associated threat information are unique worldwide.<\/p>\n<p><b>Threat<\/b><b> Information Database<\/b><\/p>\n<p>The <strong>IKARUS threat.intelligence.platform<\/strong> \u00a0provides you with the combined expertise of leading global and national security service providers. We aggregate international and local threat intelligence so that it can be understood and used in the overall context.<\/p>\n<p>The strategic, operational and tactical threat intelligence ranges from knowledge about an attacker&#8217;s malware and infrastructure to typical modus operandi, motives, popular vulnerabilities and preferred target companies or systems and sponsors.<\/p>\n<p>There is also a focus on the local aspect: the IKARUS sensor network makes it possible to prioritize globally propagated threat information for Central Europe or even Austria.<\/p>\n<h3>Case Management<\/h3>\n<p>With Case Management, different workflows can be realized system-supported &#8211; depending on the use case. Both automated steps and manual tasks for which analysts are required can be implemented.<\/p>\n<p>Within the IKARUS TIP, cases are documented in a way that allows a direct connection to the indicators or artefacts that have arisen. By linking cases, all relevant data from the past are automatically made available as soon as an indicator that is already known is viewed again.<\/p>\n<h3>SOAR (Security Orchestration, Automation and Response)<\/h3>\n<p>With the <strong>IKARUS threat.intelligence.platform<\/strong>, you can implement automation directly from the platform. SOAR supports you in developing any actions or integrations (use cases) yourself or applying them directly. These can be actions such as EDR containment, firewall or proxy rules or integrations such as MISP export\/import, ticket systems or CMDB.<\/p>\n<p>IKARUS offers the <strong>IKARUS threat.intelligence.platform<\/strong> not only as one comprehensive product. Our team of experts also supports you with integration, support and training. Your required use cases can be documented and implemented in the platform.<\/p>\n<\/div><\/section><br \/>\n<div  class='avia-button-wrap av-11121uj-6545018271e2909ac60bd98226f94326-wrap avia-button-left  avia-builder-el-11  el_after_av_textblock  el_before_av_button '><a href='\/wp-content\/downloads\/IKARUS-threat-intelligence-platform-datasheet-en.pdf'  class='avia-button av-11121uj-6545018271e2909ac60bd98226f94326 av-link-btn avia-icon_select-no avia-size-small avia-position-left avia-color-dark'  target=\"_blank\"  rel=\"noopener noreferrer\"  aria-label=\"Datasheet\"><span class='avia_iconbox_title' >Datasheet<\/span><\/a><\/div><br \/>\n<div  class='avia-button-wrap av-sz63ej-f8ff1b23d51769125014b707c9e852b1-wrap avia-button-left  avia-builder-el-12  el_after_av_button  avia-builder-el-last '><a href='mailto:sales@ikarus.at?subject=IKARUS%20threat.intelligence.platform%20request%20from%20www.ikarussecurity.com'  class='avia-button av-sz63ej-f8ff1b23d51769125014b707c9e852b1 av-link-btn avia-icon_select-no avia-size-medium avia-position-left avia-color-theme-color'  target=\"_blank\"  rel=\"noopener noreferrer\"  aria-label=\"Send a request\"><span class='avia_iconbox_title' >Send a request<\/span><\/a><\/div><\/p>\n<\/div><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-3z0k63-12-63ea50afead99ef8cf7f392e4e954779\">\n.flex_cell.av-3z0k63-12-63ea50afead99ef8cf7f392e4e954779{\nvertical-align:top;\n}\n.responsive #top #wrap_all .flex_cell.av-3z0k63-12-63ea50afead99ef8cf7f392e4e954779{\npadding:30px 30px 30px 30px !important;\n}\n<\/style>\n<div class='flex_cell av-3z0k63-12-63ea50afead99ef8cf7f392e4e954779 av-gridrow-cell av_one_half no_margin  avia-builder-el-13  el_after_av_cell_one_half  avia-builder-el-last  content-align-top'  ><div class='flex_cell_inner'><p>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-av_heading-5f1712ba42384e10c70e659c82d83986\">\n#top .av-special-heading.av-av_heading-5f1712ba42384e10c70e659c82d83986{\npadding-bottom:10px;\ncolor:#d4310f;\n}\nbody .av-special-heading.av-av_heading-5f1712ba42384e10c70e659c82d83986 .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-av_heading-5f1712ba42384e10c70e659c82d83986 .special-heading-inner-border{\nborder-color:#d4310f;\n}\n.av-special-heading.av-av_heading-5f1712ba42384e10c70e659c82d83986 .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-av_heading-5f1712ba42384e10c70e659c82d83986 av-special-heading-h3 custom-color-heading blockquote modern-quote modern-centered  avia-builder-el-14  el_before_av_textblock  avia-builder-el-first '><h3 class='av-special-heading-tag '  itemprop=\"headline\"  >IKARUS threat.intelligence.platform<\/h3><div class='av_custom_color av-subheading av-subheading_below'><p>Via Cloud \u2013 On-Premises \u2013 Air-Gapped (Classified) Environments<\/p>\n<\/div><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n<section  class='av_textblock_section av-jyzx0kqa-8-cf000336a3632c1f763aa7b0f2fb0495 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-30180\" src=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2023\/09\/IKARUS-TIP-Air-Gapped.png\" alt=\"Integration possibilities of the IKARUS threat.intelligence.platform\" width=\"869\" height=\"267\" srcset=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2023\/09\/IKARUS-TIP-Air-Gapped.png 869w, https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2023\/09\/IKARUS-TIP-Air-Gapped-300x92.png 300w, https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2023\/09\/IKARUS-TIP-Air-Gapped-768x236.png 768w, https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2023\/09\/IKARUS-TIP-Air-Gapped-705x217.png 705w\" sizes=\"auto, (max-width: 869px) 100vw, 869px\" \/><\/p>\n<\/div><\/section><br \/>\n<section  class='av_textblock_section av-lmsw84nb-facbf22856b0c7b8ae91ed2809133e6d '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><p style=\"text-align: center;\"><em>Integration possibilities of the IKARUS threat.intelligence.platform<\/em><\/p>\n<\/div><\/section><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-av_heading-5b9462c897c55b13763af325e847ee65\">\n#top .av-special-heading.av-av_heading-5b9462c897c55b13763af325e847ee65{\npadding-bottom:10px;\ncolor:#d4310f;\n}\nbody .av-special-heading.av-av_heading-5b9462c897c55b13763af325e847ee65 .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-av_heading-5b9462c897c55b13763af325e847ee65 .special-heading-inner-border{\nborder-color:#d4310f;\n}\n.av-special-heading.av-av_heading-5b9462c897c55b13763af325e847ee65 .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-av_heading-5b9462c897c55b13763af325e847ee65 av-special-heading-h3 custom-color-heading blockquote modern-quote modern-centered  avia-builder-el-17  el_after_av_textblock  el_before_av_textblock '><h3 class='av-special-heading-tag '  itemprop=\"headline\"  >Cyber Threat Intelligence Levels<\/h3><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n<section  class='av_textblock_section av-av_textblock-7a1af7d8f9790576b1769c0a9f0449ed '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-24505\" src=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2022\/10\/CTI-Levels-en.jpg\" alt=\"CTI levels\" width=\"802\" height=\"432\" srcset=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2022\/10\/CTI-Levels-en.jpg 802w, https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2022\/10\/CTI-Levels-en-300x162.jpg 300w, https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2022\/10\/CTI-Levels-en-768x414.jpg 768w, https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2022\/10\/CTI-Levels-en-705x380.jpg 705w\" sizes=\"auto, (max-width: 802px) 100vw, 802px\" \/><\/p>\n<\/div><\/section><br \/>\n<section  class='av_textblock_section av-7muxn-60f3708e3119b7726fa209ab6f5bec25 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><p style=\"text-align: center;\"><em>CTI levels \u2013 <i>the<\/i> <i>three<\/i> <i>levels<\/i> <i>of<\/i> <i>Cyber<\/i> <i>Threat<\/i> <i>Intelligence<\/i><\/em><\/p>\n<\/div><\/section><\/p>\n<\/div><\/div>\n<\/div>\n<div id='av-layout-grid-4'  class='av-layout-grid-container av-rr8gnv-13-4a6dc6622c301799a8f49648ab4dbe8b entry-content-wrapper main_color av-flex-cells  avia-builder-el-20  el_after_av_layout_row  el_before_av_layout_row  grid-row-not-first  container_wrap fullsize'  >\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-3z0k63-9-b50ed1de395118c4689cc80159efceb4\">\n.flex_cell.av-3z0k63-9-b50ed1de395118c4689cc80159efceb4{\nvertical-align:top;\nbackground-color:#f4f4f4;\n}\n.responsive #top #wrap_all .flex_cell.av-3z0k63-9-b50ed1de395118c4689cc80159efceb4{\npadding:30px 30px 30px 30px !important;\n}\n<\/style>\n<div class='flex_cell av-3z0k63-9-b50ed1de395118c4689cc80159efceb4 av-gridrow-cell av_one_half no_margin  avia-builder-el-21  el_before_av_cell_one_half  avia-builder-el-first  content-align-top'  ><div class='flex_cell_inner'><section  class='av_textblock_section av-1fj0rwb-b7cab72fce9c660beba1d8a27228b4a9 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h3>Advantages of the IKARUS threat.intelligence.platform<\/h3>\n<ul>\n<li>Targeted response to cyber security incidents<\/li>\n<li>Attributed and up-to-date local and global threat intelligence<\/li>\n<li>Knowledge of current attack methodologies and incidents worldwide<\/li>\n<li>Creation of strategic situational awareness<\/li>\n<li>Optimised risk management and cyber prevention<\/li>\n<\/ul>\n<\/div><\/section>\n<\/div><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-44368r-86bcc6461bb8cdd49094cceca14f6cab\">\n.flex_cell.av-44368r-86bcc6461bb8cdd49094cceca14f6cab{\nvertical-align:top;\nbackground-color:#f4f4f4;\n}\n.responsive #top #wrap_all .flex_cell.av-44368r-86bcc6461bb8cdd49094cceca14f6cab{\npadding:30px 30px 30px 30px !important;\n}\n<\/style>\n<div class='flex_cell av-44368r-86bcc6461bb8cdd49094cceca14f6cab av-gridrow-cell av_one_half no_margin  avia-builder-el-23  el_after_av_cell_one_half  avia-builder-el-last  content-align-top'  ><div class='flex_cell_inner'><section  class='av_textblock_section av-jxna5an0-fc1fb7a25062f3a8946626f8c7fac3b9 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h3>Highlights<\/h3>\n<ul>\n<li>High-quality global and local threat intelligence producers<\/li>\n<li>Strategic, operational and tactical information<\/li>\n<li>Flexible data access \/ system integration as required<\/li>\n<li>Targeted investigation (pivoting) and mapping of desired use cases<\/li>\n<li>Interface to existing cyber defence technologies (SIEM, EDR, NIDS, Sandboxes, Firewalls, Proxies etc.)<\/li>\n<\/ul>\n<\/div><\/section>\n<\/div><\/div>\n<\/div>\n<div id='av-layout-grid-5'  class='av-layout-grid-container av-429mesb-f78bb8eb5577f68d45e2c41377cc0387 entry-content-wrapper main_color av-flex-cells  avia-builder-el-25  el_after_av_layout_row  el_before_av_layout_row  grid-row-not-first  container_wrap fullsize'  >\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-3oanexn-e578a4250681e073da35519a1450dd50\">\n.flex_cell.av-3oanexn-e578a4250681e073da35519a1450dd50{\nvertical-align:top;\n}\n.responsive #top #wrap_all .flex_cell.av-3oanexn-e578a4250681e073da35519a1450dd50{\npadding:30px 30px 30px 30px !important;\n}\n<\/style>\n<div class='flex_cell av-3oanexn-e578a4250681e073da35519a1450dd50 av-gridrow-cell av_one_fourth no_margin  avia-builder-el-26  el_before_av_cell_one_fourth  avia-builder-el-first  content-align-top'  ><div class='flex_cell_inner'><section  class='av_textblock_section av-l8my4r9e-5d92964a8577a08640c4ea7aa5c0e7cf '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h3>Data sources<\/h3>\n<p>Global and Local Threat Data\u00a0 (Raw Data)<\/p>\n<ul>\n<li>Commercial Sources<\/li>\n<li>Open Sources<\/li>\n<li>Common Frameworks (Mitre, NVD, CWE)<\/li>\n<li>IKARUS Sensor Network<\/li>\n<\/ul>\n<\/div><\/section>\n<\/div><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-34l55bv-072bb47f09f793e956c789240ea1ccea\">\n.flex_cell.av-34l55bv-072bb47f09f793e956c789240ea1ccea{\nvertical-align:top;\n}\n.responsive #top #wrap_all .flex_cell.av-34l55bv-072bb47f09f793e956c789240ea1ccea{\npadding:30px 30px 30px 30px !important;\n}\n<\/style>\n<div class='flex_cell av-34l55bv-072bb47f09f793e956c789240ea1ccea av-gridrow-cell av_one_fourth no_margin  avia-builder-el-28  el_after_av_cell_one_fourth  el_before_av_cell_one_half  content-align-top'  ><div class='flex_cell_inner'><p><section  class='av_textblock_section av-l8mye1oz-fc7af13a4f20c4dafa83f71d804a1e94 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><p><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-medium wp-image-44613\" src=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/03\/IKARUS_Logo-red-rgb-350-300x72.png\" alt=\"IKARUS Security\" width=\"300\" height=\"72\" srcset=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/03\/IKARUS_Logo-red-rgb-350-300x72.png 300w, https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/03\/IKARUS_Logo-red-rgb-350.png 350w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-medium wp-image-18290\" src=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2022\/01\/mandiant-logo-web-300x87.png\" alt=\"MANDIANT\" width=\"300\" height=\"87\" srcset=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2022\/01\/mandiant-logo-web-300x87.png 300w, https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2022\/01\/mandiant-logo-web.png 450w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-24469\" src=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2022\/09\/logo-kaspersky.jpg\" alt=\"Kaspersky\" width=\"300\" height=\"62\" \/><\/p>\n<\/div><\/section><br \/>\n<section  class='av_textblock_section av-2m2qnx7-7078162308b7f2fd4965598b241e52ab '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><p>&#8230;and others<\/p>\n<\/div><\/section><\/p>\n<\/div><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-1z1k9q3-f68d79ba2418c8031ea3c98380a86453\">\n.flex_cell.av-1z1k9q3-f68d79ba2418c8031ea3c98380a86453{\nvertical-align:top;\n}\n.responsive #top #wrap_all .flex_cell.av-1z1k9q3-f68d79ba2418c8031ea3c98380a86453{\npadding:30px 30px 30px 30px !important;\n}\n<\/style>\n<div class='flex_cell av-1z1k9q3-f68d79ba2418c8031ea3c98380a86453 av-gridrow-cell av_one_half no_margin  avia-builder-el-31  el_after_av_cell_one_fourth  avia-builder-el-last  content-align-top'  ><div class='flex_cell_inner'><section  class='av_textblock_section av-1obzyd7-96fb15ae302a0656de97153ae0b48ff2 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h3>Consulting on the benefits and integration of Cyber Threat Intelligence<\/h3>\n<p>Do you have questions about the structure, use or individual benefits of the IKARUS threat.intelligence.platform? Contact our sales and expert team!<\/p>\n<ul>\n<li>Phone: +43 1 58995-500<\/li>\n<li>Email: <a title=\"Schreiben Sie unserem Sales-Team eine E-Mail\" href=\"mailto:sales@ikarus.at?subject=IKARUS%20anti.virus%20Testversion%20bestellen\">sales@ikarus.at<\/a><\/li>\n<\/ul>\n<\/div><\/section><br \/>\n<div  class='avia-button-wrap av-kbjtdn-59efabb73066b1a877cc6cb61a0edc73-wrap avia-button-left  avia-builder-el-33  el_after_av_textblock  avia-builder-el-last '><a href='mailto:sales@ikarus.at?subject=IKARUS%20threat.intelligence.platform%20request%20from%20www.ikarussecurity.com'  class='avia-button av-kbjtdn-59efabb73066b1a877cc6cb61a0edc73 av-link-btn avia-icon_select-no avia-size-medium avia-position-left avia-color-theme-color'  target=\"_blank\"  rel=\"noopener noreferrer\"  aria-label=\"Send a request\"><span class='avia_iconbox_title' >Send a request<\/span><\/a><\/div><\/p>\n<\/div><\/div><\/div><div id='av-layout-grid-6'  class='av-layout-grid-container av-av_layout_row-46d56c4f66cbc09d226fc8a5cde06bdd entry-content-wrapper main_color av-flex-cells  avia-builder-el-34  el_after_av_layout_row  el_before_av_layout_row  grid-row-not-first  container_wrap fullsize'  >\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-av_cell_one_full-cabae9bdfb0e32d9e0addadb0685857c\">\n.flex_cell.av-av_cell_one_full-cabae9bdfb0e32d9e0addadb0685857c{\nvertical-align:top;\n}\n.responsive #top #wrap_all .flex_cell.av-av_cell_one_full-cabae9bdfb0e32d9e0addadb0685857c{\npadding:30px 30px 30px 30px !important;\n}\n<\/style>\n<div class='flex_cell av-av_cell_one_full-cabae9bdfb0e32d9e0addadb0685857c av-gridrow-cell av_one_full no_margin  avia-builder-el-35  avia-builder-el-no-sibling  content-align-top'  ><div class='flex_cell_inner'><section  class='av_textblock_section av-lmsw9dek-9207b366401982ec8a5b78f0c50d56cd '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h3>More cyber security solutions<\/h3>\n<\/div><\/section>\n<\/div><\/div>\n<\/div><\/p>\n<div id='av-layout-grid-7'  class='av-layout-grid-container av-av_layout_row-46d56c4f66cbc09d226fc8a5cde06bdd entry-content-wrapper main_color av-flex-cells  avia-builder-el-37  el_after_av_layout_row  avia-builder-el-last  grid-row-not-first  container_wrap fullsize'  >\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-av_cell_one_fourth-6c902beb08ce969d2989d63dd4696133\">\n.flex_cell.av-av_cell_one_fourth-6c902beb08ce969d2989d63dd4696133{\nvertical-align:top;\n}\n.responsive #top #wrap_all .flex_cell.av-av_cell_one_fourth-6c902beb08ce969d2989d63dd4696133{\npadding:30px 30px 30px 30px !important;\n}\n<\/style>\n<div class='flex_cell av-av_cell_one_fourth-6c902beb08ce969d2989d63dd4696133 av-gridrow-cell av_one_fourth no_margin  avia-builder-el-38  el_before_av_cell_one_fourth  avia-builder-el-first  content-align-top'  ><div class='flex_cell_inner'><p>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-lmswalpo-2baa104de585771cbe3bfca67be56d16\">\n.avia-image-container.av-lmswalpo-2baa104de585771cbe3bfca67be56d16 img.avia_image{\nbox-shadow:none;\n}\n.avia-image-container.av-lmswalpo-2baa104de585771cbe3bfca67be56d16 .av-image-caption-overlay-center{\ncolor:#ffffff;\n}\n<\/style>\n<div  class='avia-image-container av-lmswalpo-2baa104de585771cbe3bfca67be56d16 av-styling- av-img-linked avia-align-center  avia-builder-el-39  el_before_av_textblock  avia-builder-el-first '   itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" ><div class=\"avia-image-container-inner\"><div class=\"avia-image-overlay-wrap\"><a href=\"https:\/\/www.ikarussecurity.com\/en\/managed-it-ot-security-solutions\/ikarus-24-7-incident-response\/\" class='avia_image '  aria-label='quadrat-IKARUS-Incident-Response'><img fetchpriority=\"high\" class='wp-image-27978 avia-img-lazy-loading-not-27978 avia_image ' src='https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2023\/05\/quadrat-IKARUS-Incident-Response-300x300.jpg' alt='IKARUS \u000b24\/7 Incident Response' title='quadrat-IKARUS-Incident-Response'  height=\"300\" width=\"300\"  itemprop=\"thumbnailUrl\"  \/><\/a><\/div><\/div><\/div><br \/>\n<section  class='av_textblock_section av-lmswa16z-f04436c857edfb61f767f8925a4d2330 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h3 style=\"text-align: center;\"><a href=\"https:\/\/www.ikarussecurity.com\/en\/industrial-cyber-security\/ikarus-24-7-incident-response\/\">IKARUS 24\/7 incident.response<\/a><\/h3>\n<\/div><\/section><\/p>\n<\/div><\/div><div class='flex_cell av-av_cell_one_fourth-f73a11ccd29996a2a11249d534554c23 av-gridrow-cell av_one_fourth no_margin  avia-builder-el-41  el_after_av_cell_one_fourth  el_before_av_cell_one_fourth '  ><div class='flex_cell_inner'><p>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-lmswbp0r-fe653768a28e5bd00fb05f66e6c7f22c\">\n.avia-image-container.av-lmswbp0r-fe653768a28e5bd00fb05f66e6c7f22c img.avia_image{\nbox-shadow:none;\n}\n.avia-image-container.av-lmswbp0r-fe653768a28e5bd00fb05f66e6c7f22c .av-image-caption-overlay-center{\ncolor:#ffffff;\n}\n<\/style>\n<div  class='avia-image-container av-lmswbp0r-fe653768a28e5bd00fb05f66e6c7f22c av-styling- av-img-linked avia-align-center  avia-builder-el-42  el_before_av_textblock  avia-builder-el-first '   itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" ><div class=\"avia-image-container-inner\"><div class=\"avia-image-overlay-wrap\"><a href=\"https:\/\/www.ikarussecurity.com\/en\/managed-it-ot-security-solutions\/ikarus-mail-security\/\" class='avia_image '  aria-label='e-mail02-300'><img fetchpriority=\"high\" class='wp-image-30197 avia-img-lazy-loading-not-30197 avia_image ' src='https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2023\/09\/e-mail02-300.jpg' alt='IKARUS mail.security mit ATP und S\/MIME' title='e-mail02-300'  height=\"300\" width=\"300\"  itemprop=\"thumbnailUrl\"  \/><\/a><\/div><\/div><\/div><br \/>\n<section  class='av_textblock_section av-lmswbajp-d9345ca8a3d3683af59f3a894596a1e9 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h3 style=\"text-align: center;\"><a href=\"https:\/\/www.ikarussecurity.com\/en\/managed-it-ot-security-solutions\/ikarus-mail-security\/\">IKARUS mail.security mit ATP und S\/MIME<\/a><\/h3>\n<\/div><\/section><\/p>\n<\/div><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-av_cell_one_fourth-6c902beb08ce969d2989d63dd4696133\">\n.flex_cell.av-av_cell_one_fourth-6c902beb08ce969d2989d63dd4696133{\nvertical-align:top;\n}\n.responsive #top #wrap_all .flex_cell.av-av_cell_one_fourth-6c902beb08ce969d2989d63dd4696133{\npadding:30px 30px 30px 30px !important;\n}\n<\/style>\n<div class='flex_cell av-av_cell_one_fourth-6c902beb08ce969d2989d63dd4696133 av-gridrow-cell av_one_fourth no_margin  avia-builder-el-44  el_after_av_cell_one_fourth  el_before_av_cell_one_fourth  content-align-top'  ><div class='flex_cell_inner'><p>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-lmswc9ey-13dd8aa0dffc78b5ffcc4386b82ee978\">\n.avia-image-container.av-lmswc9ey-13dd8aa0dffc78b5ffcc4386b82ee978 img.avia_image{\nbox-shadow:none;\n}\n.avia-image-container.av-lmswc9ey-13dd8aa0dffc78b5ffcc4386b82ee978 .av-image-caption-overlay-center{\ncolor:#ffffff;\n}\n<\/style>\n<div  class='avia-image-container av-lmswc9ey-13dd8aa0dffc78b5ffcc4386b82ee978 av-styling- av-img-linked avia-align-center  avia-builder-el-45  el_before_av_textblock  avia-builder-el-first '   itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" ><div class=\"avia-image-container-inner\"><div class=\"avia-image-overlay-wrap\"><a href=\"https:\/\/www.ikarussecurity.com\/en\/anti-malware-sdks-and-apis\/\" class='avia_image '  aria-label='chamaeleon-300'><img fetchpriority=\"high\" class='wp-image-30200 avia-img-lazy-loading-not-30200 avia_image ' src='https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2023\/09\/chamaeleon-300.jpg' alt='IKARUS malware.scan.service' title='chamaeleon-300'  height=\"300\" width=\"299\"  itemprop=\"thumbnailUrl\"  \/><\/a><\/div><\/div><\/div><br \/>\n<section  class='av_textblock_section av-lmswcpev-736b25828acae419860f22acc76bd420 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h3 style=\"text-align: center;\"><a href=\"https:\/\/www.ikarussecurity.com\/en\/anti-malware-sdks-and-apis\/\">IKARUS malware.scan.service<\/a><\/h3>\n<\/div><\/section><\/p>\n<\/div><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-av_cell_one_fourth-6c902beb08ce969d2989d63dd4696133\">\n.flex_cell.av-av_cell_one_fourth-6c902beb08ce969d2989d63dd4696133{\nvertical-align:top;\n}\n.responsive #top #wrap_all .flex_cell.av-av_cell_one_fourth-6c902beb08ce969d2989d63dd4696133{\npadding:30px 30px 30px 30px !important;\n}\n<\/style>\n<div class='flex_cell av-av_cell_one_fourth-6c902beb08ce969d2989d63dd4696133 av-gridrow-cell av_one_fourth no_margin  avia-builder-el-47  el_after_av_cell_one_fourth  avia-builder-el-last  content-align-top'  ><div class='flex_cell_inner'><p>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-lmswdxwu-db8a2a7bfafb27ca7920c2f2fb26e9c2\">\n.avia-image-container.av-lmswdxwu-db8a2a7bfafb27ca7920c2f2fb26e9c2 img.avia_image{\nbox-shadow:none;\n}\n.avia-image-container.av-lmswdxwu-db8a2a7bfafb27ca7920c2f2fb26e9c2 .av-image-caption-overlay-center{\ncolor:#ffffff;\n}\n<\/style>\n<div  class='avia-image-container av-lmswdxwu-db8a2a7bfafb27ca7920c2f2fb26e9c2 av-styling- av-img-linked avia-align-center  avia-builder-el-48  el_before_av_textblock  avia-builder-el-first '   itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" ><div class=\"avia-image-container-inner\"><div class=\"avia-image-overlay-wrap\"><a href=\"https:\/\/www.ikarussecurity.com\/en\/managed-it-ot-security-solutions\/ikarus-mobile-management\/\" class='avia_image '  aria-label='mobile-300'><img fetchpriority=\"high\" class='wp-image-30202 avia-img-lazy-loading-not-30202 avia_image ' src='https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2023\/09\/mobile-300.jpg' alt='IKARUS mobile.management' title='mobile-300'  height=\"300\" width=\"300\"  itemprop=\"thumbnailUrl\"  \/><\/a><\/div><\/div><\/div><br \/>\n<section  class='av_textblock_section av-lmswdmfg-6444241fc520f9744050e2b39a307252 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h3 style=\"text-align: center;\"><a href=\"https:\/\/www.ikarussecurity.com\/en\/managed-it-ot-security-solutions\/ikarus-mobile-management\/\">IKARUS mobile.management<\/a><\/h3>\n<\/div><\/section><\/p>\n<\/div><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"parent":4310,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"tags":[],"class_list":["post-24502","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>IKARUS threat.intelligence.platform - IKARUS Security<\/title>\n<meta name=\"description\" content=\"Attribuierte lokale und globale Bedrohungsinformation in einem flexiblen Plattformkonzept - via Cloud, On-Premises oder f\u00fcr Air Gap.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.ikarussecurity.com\/en\/managed-it-ot-security-solutions\/ikarus-threat-intelligence-platform\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"IKARUS threat.intelligence.platform - IKARUS Security\" \/>\n<meta property=\"og:description\" content=\"Attribuierte lokale und globale Bedrohungsinformation in einem flexiblen Plattformkonzept - via Cloud, On-Premises oder f\u00fcr Air Gap.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.ikarussecurity.com\/en\/managed-it-ot-security-solutions\/ikarus-threat-intelligence-platform\/\" \/>\n<meta property=\"og:site_name\" content=\"IKARUS Security\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ikarusantivirussoftware\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-25T18:45:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2023\/09\/IKARUS-TIP-Air-Gapped.png\" \/>\n\t<meta property=\"og:image:width\" content=\"869\" \/>\n\t<meta property=\"og:image:height\" content=\"267\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@ikarusantivirus\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.ikarussecurity.com\/en\/managed-it-ot-security-solutions\/ikarus-threat-intelligence-platform\/\",\"url\":\"https:\/\/www.ikarussecurity.com\/en\/managed-it-ot-security-solutions\/ikarus-threat-intelligence-platform\/\",\"name\":\"IKARUS threat.intelligence.platform - IKARUS Security\",\"isPartOf\":{\"@id\":\"https:\/\/www.ikarussecurity.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.ikarussecurity.com\/en\/managed-it-ot-security-solutions\/ikarus-threat-intelligence-platform\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.ikarussecurity.com\/en\/managed-it-ot-security-solutions\/ikarus-threat-intelligence-platform\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2023\/09\/IKARUS-TIP-Air-Gapped.png\",\"datePublished\":\"2022-10-04T10:05:10+00:00\",\"dateModified\":\"2026-03-25T18:45:55+00:00\",\"description\":\"Attribuierte lokale und globale Bedrohungsinformation in einem flexiblen Plattformkonzept - via Cloud, On-Premises oder f\u00fcr Air Gap.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.ikarussecurity.com\/en\/managed-it-ot-security-solutions\/ikarus-threat-intelligence-platform\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.ikarussecurity.com\/en\/managed-it-ot-security-solutions\/ikarus-threat-intelligence-platform\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.ikarussecurity.com\/en\/managed-it-ot-security-solutions\/ikarus-threat-intelligence-platform\/#primaryimage\",\"url\":\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2023\/09\/IKARUS-TIP-Air-Gapped.png\",\"contentUrl\":\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2023\/09\/IKARUS-TIP-Air-Gapped.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.ikarussecurity.com\/en\/managed-it-ot-security-solutions\/ikarus-threat-intelligence-platform\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.ikarussecurity.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IT Security Solutions\",\"item\":\"https:\/\/www.ikarussecurity.com\/en\/managed-it-ot-security-solutions\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"IKARUS threat.intelligence.platform\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.ikarussecurity.com\/en\/#website\",\"url\":\"https:\/\/www.ikarussecurity.com\/en\/\",\"name\":\"IKARUS Security\",\"description\":\"Sovereign Cybersecurity\",\"publisher\":{\"@id\":\"https:\/\/www.ikarussecurity.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.ikarussecurity.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.ikarussecurity.com\/en\/#organization\",\"name\":\"IKARUS Security Software\",\"url\":\"https:\/\/www.ikarussecurity.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.ikarussecurity.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2022\/06\/ikarus-logo.png\",\"contentUrl\":\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2022\/06\/ikarus-logo.png\",\"width\":1805,\"height\":448,\"caption\":\"IKARUS Security Software\"},\"image\":{\"@id\":\"https:\/\/www.ikarussecurity.com\/en\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ikarusantivirussoftware\",\"https:\/\/x.com\/ikarusantivirus\",\"https:\/\/www.linkedin.com\/company\/ikarus-security-software-gmbh\",\"https:\/\/www.xing.com\/pages\/ikarussecuritysoftwaregmbh\",\"https:\/\/www.youtube.com\/channel\/UCRRsH3IwUJQqwtBYpNp0Tuw\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"IKARUS threat.intelligence.platform - IKARUS Security","description":"Attribuierte lokale und globale Bedrohungsinformation in einem flexiblen Plattformkonzept - via Cloud, On-Premises oder f\u00fcr Air Gap.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.ikarussecurity.com\/en\/managed-it-ot-security-solutions\/ikarus-threat-intelligence-platform\/","og_locale":"en_US","og_type":"article","og_title":"IKARUS threat.intelligence.platform - IKARUS Security","og_description":"Attribuierte lokale und globale Bedrohungsinformation in einem flexiblen Plattformkonzept - via Cloud, On-Premises oder f\u00fcr Air Gap.","og_url":"https:\/\/www.ikarussecurity.com\/en\/managed-it-ot-security-solutions\/ikarus-threat-intelligence-platform\/","og_site_name":"IKARUS Security","article_publisher":"https:\/\/www.facebook.com\/ikarusantivirussoftware","article_modified_time":"2026-03-25T18:45:55+00:00","og_image":[{"width":869,"height":267,"url":"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2023\/09\/IKARUS-TIP-Air-Gapped.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_site":"@ikarusantivirus","twitter_misc":{"Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.ikarussecurity.com\/en\/managed-it-ot-security-solutions\/ikarus-threat-intelligence-platform\/","url":"https:\/\/www.ikarussecurity.com\/en\/managed-it-ot-security-solutions\/ikarus-threat-intelligence-platform\/","name":"IKARUS threat.intelligence.platform - IKARUS Security","isPartOf":{"@id":"https:\/\/www.ikarussecurity.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.ikarussecurity.com\/en\/managed-it-ot-security-solutions\/ikarus-threat-intelligence-platform\/#primaryimage"},"image":{"@id":"https:\/\/www.ikarussecurity.com\/en\/managed-it-ot-security-solutions\/ikarus-threat-intelligence-platform\/#primaryimage"},"thumbnailUrl":"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2023\/09\/IKARUS-TIP-Air-Gapped.png","datePublished":"2022-10-04T10:05:10+00:00","dateModified":"2026-03-25T18:45:55+00:00","description":"Attribuierte lokale und globale Bedrohungsinformation in einem flexiblen Plattformkonzept - via Cloud, On-Premises oder f\u00fcr Air Gap.","breadcrumb":{"@id":"https:\/\/www.ikarussecurity.com\/en\/managed-it-ot-security-solutions\/ikarus-threat-intelligence-platform\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.ikarussecurity.com\/en\/managed-it-ot-security-solutions\/ikarus-threat-intelligence-platform\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.ikarussecurity.com\/en\/managed-it-ot-security-solutions\/ikarus-threat-intelligence-platform\/#primaryimage","url":"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2023\/09\/IKARUS-TIP-Air-Gapped.png","contentUrl":"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2023\/09\/IKARUS-TIP-Air-Gapped.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.ikarussecurity.com\/en\/managed-it-ot-security-solutions\/ikarus-threat-intelligence-platform\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.ikarussecurity.com\/en\/"},{"@type":"ListItem","position":2,"name":"IT Security Solutions","item":"https:\/\/www.ikarussecurity.com\/en\/managed-it-ot-security-solutions\/"},{"@type":"ListItem","position":3,"name":"IKARUS threat.intelligence.platform"}]},{"@type":"WebSite","@id":"https:\/\/www.ikarussecurity.com\/en\/#website","url":"https:\/\/www.ikarussecurity.com\/en\/","name":"IKARUS Security","description":"Sovereign Cybersecurity","publisher":{"@id":"https:\/\/www.ikarussecurity.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.ikarussecurity.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.ikarussecurity.com\/en\/#organization","name":"IKARUS Security Software","url":"https:\/\/www.ikarussecurity.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.ikarussecurity.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2022\/06\/ikarus-logo.png","contentUrl":"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2022\/06\/ikarus-logo.png","width":1805,"height":448,"caption":"IKARUS Security Software"},"image":{"@id":"https:\/\/www.ikarussecurity.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ikarusantivirussoftware","https:\/\/x.com\/ikarusantivirus","https:\/\/www.linkedin.com\/company\/ikarus-security-software-gmbh","https:\/\/www.xing.com\/pages\/ikarussecuritysoftwaregmbh","https:\/\/www.youtube.com\/channel\/UCRRsH3IwUJQqwtBYpNp0Tuw"]}]}},"_links":{"self":[{"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/pages\/24502","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/comments?post=24502"}],"version-history":[{"count":30,"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/pages\/24502\/revisions"}],"predecessor-version":[{"id":44873,"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/pages\/24502\/revisions\/44873"}],"up":[{"embeddable":true,"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/pages\/4310"}],"wp:attachment":[{"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/media?parent=24502"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/tags?post=24502"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}