Introducing ThreatConnect 6.3 - Improving Threat Intelligence Processes and SOC Performance Metrics

Latest release gives threat intel analysts six new Group Types for more intuitive data mapping, and new Dashboard Metrics for SOC managers to assess detection and resolution times

ARLINGTON, Va.--()--ThreatConnect Inc.®, the leader in reducing complexity and enabling better decision-making in cybersecurity, today released ThreatConnect 6.3, which significantly improves the threat intelligence process by introducing six new threat intelligence group types for clearer and more intuitive data mapping for cyber threat intelligence analysts and our threat intel partnered integrations, as well as Workflow Metrics to help Security Operations Center (SOC) Directors identify whether the tools, processes, and automations in place are helping the organization identify and remediate threats faster.

ThreatConnect, the first and only in the market to truly integrate TIP and SOAR capabilities, continues to change the way security works. The only company with Cyber Risk Quantification (CRQ), TIP, and SOAR capabilities combined, ThreatConnect unifies the actions of the security team around the most critical risks, supports their response with streamlined and automated workflows, and strengthens the entire security ecosystem through powerful technology integrations.

“Our quarterly release of ThreatConnect 6.3 for our TIP, SOAR, and Intel Driven Operations (IDO) customers drives home our dedication to threat intelligence teams, security operations teams, and facilitating the workflow between the two teams to enable more accurate, efficient, and faster decision making to protect the business,” says Andy Pendergast, EVP of Product and Co-Founder. “We’re excited to help our customers map intel more accurately and robustly in both the ThreatConnect TIP and SOAR, allow flexible ways to capture investigative data in cases through attributes, and track case metrics powerfully and intuitively in ThreatConnect SOAR and IDO products.”

ThreatConnect 6.3 introduces the following new key capabilities:

  • New Group Objects
  • Workflow Metrics
  • Workflow Attributes

New Group Objects

The six new Group types function like existing Groups in ThreatConnect and allow users to map their data in a clearer, more intuitive way. The new Group Objects include:

○ Attack Pattern

○ Malware

○ Vulnerability

○ Tactic

○ Tool

○ Course of Action

Ultimately, this helps ensure that the threat library you build with ThreatConnect is approachable, organized, and equipped to help your security teams when they need it most.

Other benefits include:

  • Better Alignment with STIX objects
  • Improved Threat Intel Processes by allowing users to correctly categorize threats
  • Better MITRE ATT&CK support

Workflow Metrics

Gaining insight into the SOC team’s performance is critical for security leaders. They typically have large teams that are dealing with a high volume of cases and escalations.

You can now easily create dashboard cards on three key performance indicators (KPI):

  • Mean Time to Detect (MTTD): The average time it takes to discover a security threat or incident.
  • Mean Time to Respond (MTTR): The average time it takes to control and remediate a threat.
  • False Positive Ratio: The percentage of alerts that upon investigation are revealed to be not valid threats.

These metrics will help you to identify whether tools, processes, and automations in place are helping the organization identify and remediate threats faster.

Workflow Attributes

Workflow Attributes gives you the ability to create custom data fields, called Attributes, for Cases and Templates via the UI and our robust API. You can bring in anything of value to them, such as relevant research and analysis associated with cases, affected network/business units, recommendations on courses of action, or enrichment details from other tools.

Workflow Attributes allows you and your team leaders to ensure that the most important elements needed on a Case are captured and allows coordination between teams that have different Case formats.

About ThreatConnect

ThreatConnect, Inc. provides cybersecurity software that reduces complexity for everyone, makes decision-making easy by turning intelligence into action, and integrates processes and technologies to continually strengthen defenses and drive down risk. Designed by analysts but built for the entire team (security leadership, risk, security operations, threat intelligence, and incident response), ThreatConnect’s decision and operational support platform is the only solution available today with cyber risk quantification, intelligence, automation, analytics, and workflows in one. To learn more about our Cyber Risk Quantification, Threat Intelligence Platform (TIP) or Security Orchestration, Automation, and Response (SOAR) solutions visit


Levick U.S.
Maria Stagliano
Phone: +1 202.973-5341

Lewis U.K.
Jessica Collings
Phone: +44 207.802.2626 | Fax: +44 207.802.2627

Release Summary

ThreatConnect 6.3 significantly improves the threat intelligence process and helps SOC directors identify and remediate threats faster.


Levick U.S.
Maria Stagliano
Phone: +1 202.973-5341

Lewis U.K.
Jessica Collings
Phone: +44 207.802.2626 | Fax: +44 207.802.2627