Create a Post
cancel
Showing results for 
Search instead for 
Did you mean: 
MellisWare
Explorer

Threat Map Data

Where does the data come from that populates the Threat Map?

0 Kudos
1 Reply
PhoneBoy
Admin
Admin

The marketing answer is ThreatCloud AI.
To elaborate somewhat, Quantum Security Gateways that are using our Threat Prevention technologies use ThreatCloud AI to check if traffic is malicious or not.
We can see the source/destination IP as a result of these queries, as well as the verdict of the lookups.

0 Kudos

Leaderboard

Epsum factorial non deposit quid pro quo hic escorol.

Upcoming Events

    Wed 01 May 2024 @ 02:00 PM (EDT)

    South US: HTTPS Inspection Best Practices

    Tue 23 Apr 2024 @ 11:00 AM (EDT)

    East US: What's New in R82

    Thu 25 Apr 2024 @ 11:00 AM (SGT)

    APAC: CPX 2024 Recap

    Tue 30 Apr 2024 @ 03:00 PM (CDT)

    EMEA: CPX 2024 Recap

    Wed 01 May 2024 @ 02:00 PM (EDT)

    South US: HTTPS Inspection Best Practices

    Tue 23 Apr 2024 @ 11:00 AM (EDT)

    East US: What's New in R82

    Thu 25 Apr 2024 @ 11:00 AM (SGT)

    APAC: CPX 2024 Recap

    Tue 30 Apr 2024 @ 03:00 PM (CDT)

    EMEA: CPX 2024 Recap

    Thu 02 May 2024 @ 11:00 AM (SGT)

    APAC: What's new in R82
    CheckMates Events