diff --git a/index.html b/index.html index b85c24d..d5b7771 100755 --- a/index.html +++ b/index.html @@ -17,24 +17,24 @@ layout: default
- +

The key is Automation

Isn't it sad to have a lot of data and not use it because it's too much work? Thanks to MISP you can store your IOCs in a structured manner, and thus enjoy the correlation, automated exports for IDS, or SIEM, in STIX or OpenIOC and even to other MISPs. You can now leverage the value of your data without effort and in an automated manner.

- +

Simply Threats

The primary goal of MISP is to be used. This is why simplicity is the driving force behind the project. Storing and especially using information about threats and malware should not be difficult. MISP is there to help you get the maximum out of your data without unmanageable complexity.

- +

By giving you will receive

Sharing is key to fast and effective detection of attacks. Quite often similar organisations are targeted by the same Threat Actor, in the same or different Campaign. MISP will make it easier for you to share with, but also to receive from trusted partners and trust-groups. - Sharing also enabled collaborative analysis and prevents you from doing the work someone else already did before.

+ Sharing also enabled collaborative analysis and prevents you from doing the work someone else already did before.
Join one of the existing MISP communities.