Summary is AI-generated, newsdesk-reviewed
  • EclecticIQ launches Intelligence Center 3.6 to manage sophisticated cyber threats effectively.
  • New release enhances AI tools, providing real-time insights and improved security analytics.
  • Customizable reporting environment transforms complex threat data into actionable intelligence.

Amid increasing cyber threats that have disrupted supply chains and halted operations globally, EclecticIQ announced the launch of version 3.6 of its 'Intelligence Center' platform.

This latest iteration aims to aid organizations in analyzing, structuring, and sharing cyber intelligence effectively.

Enhanced AI assistance and Data Modelling

Building on its predecessor, version 3.6 provides enhanced AI assistance and flexible data modeling, allowing analysts to work more efficiently and deliver higher-quality insights. This update focuses on real-time reporting and improved communication of value within businesses.

"Cybersecurity is no longer an isolated IT issue, it's a core business risk that affects every industry," stated Cody Barrow, CEO at EclecticIQ. Barrow noted that security teams face overwhelming volumes of emerging threats and emphasized the need for technology that simplifies complexity and facilitates confident action.

Transforming Complex Threat Data

The update features a revamped reporting setting designed to convert complex threat data into clear

The update features a revamped reporting environment designed to convert complex threat data into clear, professional intelligence outputs.

With customizable templates, a real-time editor, and centralized template management, teams can now produce polished reports quickly and efficiently. This capability aids in the precise communication of threats, adversary activities, and emerging trends.

Customizable Intelligence Representation

Intelligence Center 3.6 introduces 'Custom objects', enabling analysts to go beyond predefined STIX object types.

This feature allows users to track specific intelligence such as blockchain-based ransom activities or adversary infrastructure, tailoring insights to their environment for better relevance and actionability.

AI Suite Expansion

An expanded 'AI Suite' now offers capabilities such as summarization, translation, and content generation within the investigative workflow. Analysts can condense extensive reports and graph-based intelligence into actionable insights, integrating these directly into reports, or linking them to graph nodes. The platform continues to support the 'Bring Your Own LLM' feature, which offers control over AI deployment for optimum privacy, performance, and flexibility.

Cody Barrow further remarked, "Security teams don't need more information; they need better ways to make sense of it. Intelligence Center 3.6 empowers analysts to cut through the noise, enabling them to deliver insights that protect businesses and demonstrate the true value of intelligence-led security."

This release from EclecticIQ represents a significant advancement in reinforcing intelligence-led security operations, fostering automation, flexibility, and human-centered design to keep organizations ahead of emerging threats.

Learn why leading casinos are upgrading to smarter, faster, and more compliant systems

In case you missed it

What Are Emerging Applications For Physical Security In Transportation?
What Are Emerging Applications For Physical Security In Transportation?

Transportation systems need robust physical security to protect human life, to ensure economic stability, and to maintain national security. Because transportation involves moving...

Gallagher's Perimeter Solutions With Fortified Partnership
Gallagher's Perimeter Solutions With Fortified Partnership

Global security manufacturer Gallagher Security is proud to announce a strategic partnership with Fortified Security, a pioneering perimeter systems integrator with over 30 years o...

Genetec's Role In Data Sovereignty For Security
Genetec's Role In Data Sovereignty For Security

Genetec Inc., the global pioneer in enterprise physical security software, highlights why data sovereignty has become a central concern for physical security leaders as more survei...