ThreatMarks’ Security Operations Center’s (TM SOC) infrastructure is a central component used by all our customers. It allows each of them to benefit from the shared intelligence about threats.
Anonymized data (such as unknown malicious code samples, phishing attempts, suspicious operations, device identifiers, and user behavioral patterns) are collected from all software deployments. The data is used by TM SOC to improve the machine-learning models, detection capabilities, and overall efficiency.
In case a new strain of malware, a new phishing campaign, or fraudulent identity or behavior is identified, ThreatMark is able to share this knowledge immediately and automatically among all customers so that threats found in one location can be identified instantly if they appear elsewhere. System monitoring and continuous updates are also managed through connection to the SOC.