Celerium provides solutions that empower companies of all sizes to take a proactive, aggressive stance on cybersecurity. We revolutionized information sharing 20 years ago with secure collaboration platforms for government and industry sectors. We offer solutions for automated threat sharing and routing, secure human collaboration, and cyber threat intelligence.
Products and Services
- Full Service ISAO Stand-up
- Celerium can help launch new ISAOs by providing a total technology solution for collaboration, sharing, automation, membership management and other capabilities commonly needed by ISAOs. They partner with ISAOs to serve as an advisor on establishing effective concepts of operation for sharing cyber threat intelligence (CTI). Celerium helps implement and refine those processes for their customers, and they can start small by rolling out limited, low-cost feature packs and expand capabilities as the community matures. Or, they can immediately implement the most robust suite of collaboration and sharing tools available in the global marketplace.
- Distribution of Information
- Celerium’s threat routing technology was the first to effectively distribute CTI using STIX and TAXII. Powerful feed management capabilities enable routing of the right CTI to the right teams, organizations or devices in the ISAO’s ecosystem. Their secure human collaboration platform distributes information in human-readable form, such as cyber threat reports, requests for information or community announcements. Their technology also transforms human-readable CTI into machine-readable CTI. RESTful APIs enable further integration and distribution to achieve the ISAO’s goals.
- Organization Tools
- Celerium provides various capability models that reflect distinct concepts of operation commonly used by ISAOs. Whether the focus is on SOC workflow, CTI crowdsourcing, broad collaboration, automation or other kinds of sharing, they can match their tools to the ISAOs needs, large or small. They also can host third-party security tools, collaboration tools, listservs, and other technologies on behalf of the ISAO. It also means they can provide the flexibility, redundancy and security commonly required by ISAOs.
- Technology Platforms
- Our technology platforms can be used individually or together to serve the ISAO’s needs. Celerium’s Mission Center solution is a secure collaboration platform which provides the “virtual turf” upon which members come together to securely communicate, collaborate and coordinate. Their automated threat routing system serves as the centralized CTI repository and STIX/TAXII-based hub for the ISAO.
- Threat Management and Analysis
- With Celerium, threat data can be aggregated from members, vendors, partners and ISAO SOC analysts via a wide range of methods. Once the data resides in our platforms, it can be subject to an analyst workflow mechanism to facilitate a more formal threat management process. Or it can be further enriched via crowdsourcing in a more social, tactical and organic way. Data can be matched, tagged and processed into other systems like member SIEMs, or it can be visualized and correlated to other system data to help analysts “connect the dots” and discover the nexus of relationships between granular CTI such as indicators, or higher-order objects such as Campaigns, Actors and TTPs