mirror of https://github.com/MISP/misp-website
60 lines
3.1 KiB
HTML
Executable File
60 lines
3.1 KiB
HTML
Executable File
---
|
|
title: MISP - Malware Information Sharing Platform and Threat Sharing - The Open Source Threat Intelligence Platform
|
|
layout: default
|
|
---
|
|
|
|
<!-- Banner -->
|
|
<section id="banner">
|
|
<header>
|
|
<h2>The MISP threat sharing platform is a free and open source software helping information sharing of threat intelligence including cyber security indicators.<h2>
|
|
<br />
|
|
<p>A threat intelligence platform for gathering, sharing, storing and correlating Indicators of Compromise of targeted attacks, threat intelligence, financial fraud information, vulnerability information or even counter-terrorism information. Discover how MISP is used today in multiple organisations. Not only to store, share, collaborate on cyber security indicators, malware analysis, but also to use the IoCs and information to detect and prevent attacks or threats against ICT infrastructures, organisations or people.
|
|
</p>
|
|
<a href="features.html" class="button">Learn More</a>
|
|
</header>
|
|
</section>
|
|
|
|
<!-- Highlights -->
|
|
<section class="wrapper style1">
|
|
<div class="container">
|
|
<div class="row double">
|
|
<section class="4u">
|
|
<div class="box highlight">
|
|
<i class="icon major fa-share-alt"></i>
|
|
<h3>The key is Automation</h3>
|
|
<p>Isn't it sad to have a lot of data and not use it because it's too much work? Thanks to MISP you can store your IOCs in a structured manner, and thus enjoy the correlation, automated exports for IDS, or SIEM, in STIX or OpenIOC and even to other MISPs. You can now leverage the value of your data without effort and in an automated manner. <br/> Check out MISP <a href="features.html">features</a>.</p>
|
|
</div>
|
|
</section>
|
|
<section class="4u">
|
|
<div class="box highlight">
|
|
<i class="icon major fa-thumbs-up"></i>
|
|
<h3>Simply Threats</h3>
|
|
<p>The primary goal of MISP is to be used. This is why simplicity is the driving force behind the project. Storing and especially using information about threats and malware should not be difficult. MISP is there to help you get the maximum out of your data without unmanageable complexity.</p>
|
|
</div>
|
|
</section>
|
|
<section class="4u">
|
|
<div class="box highlight">
|
|
<i class="icon major fa-users"></i>
|
|
<h3>By giving you will receive</h3>
|
|
<p>Sharing is key to fast and effective detection of attacks. Quite often similar organisations are targeted by the same Threat Actor, in the same or different Campaign. MISP will make it easier for you to share with, but also to receive from trusted partners and trust-groups.
|
|
Sharing also enabled collaborative analysis and prevents you from doing the work someone else already did before.<br /> Join one of the <a href="./communities">existing MISP communities</a>.</p>
|
|
</div>
|
|
</section>
|
|
</div>
|
|
</div>
|
|
</section>
|
|
|
|
<!-- Gigantic Heading -->
|
|
<section class="wrapper style2">
|
|
<div class="container">
|
|
<header class="major">
|
|
<h2>More than 2500 organisations worldwide are using MISP</h2>
|
|
<p>What about your organisation?</p>
|
|
</header>
|
|
</div>
|
|
</section>
|
|
|
|
<!-- Posts -->
|
|
|
|
{% include cta.html %}
|