Threat Intelligence - API Details

Get information about Tego's threat intelligence APIs.

High-Fidelity Intelligence

Tego provides information for when a threat was first seen, whether or not it is still active, and continually enriches, checking risk scores and whether or not the threat is still active, to ensure that our intelligence is up-to-date and relevant.

All the Sources, No Extra Work

Tego brings in threat data/intelligence from over 45 different sources, open and closed, and does the work of de-duplicating and enriching to turn the data into actionable threat intelligence.

Improved Threat Investigation

Tego provides additional details about the threats through our enrichment/details API to give specific details about the threat.

Tego Threat Intelligence API

A license is required for calling Tego's API. After receiving one, make sure to add that license as a header when making requests.

For example, here's a curl request to get a single threat from the TTIP API:curl https://ti.tegocyber.com/api/Main/get/1 -H "license: myLicenseGoesHere"

FAQ

Frequently Asked Questions

Have a different question?
Contact us
What are the benefits of using Tego Cyber Threat Intelligence?

The secret to Tego's vetted and curated Threat Intelligence has been taking the approach of quality in, quality out. Tego focuses on providing high fidelity and highly contextualized threat intelligence. Tego's applies constant enrichment and the aging of threat intelligence in addition to time-boxing the threats to when they were actually in use by threat actors. Rather than focusing on providing billions of IOCs which generate a massive amount of noise for SecOps teams, Tego focuses a smaller sub-set of verified threats.

How do I set up the Tego Threat Intelligence Feed?

Tego will provide a license key for access to our API. You can call the API as frequently as you like; we recommend pulling the data every 30 minutes to 1 hour.

Where does Tego get its data?

Tego pulls data from over 45 different sources of threat data/intelligence, including free and paid-for subscriptions. Our platform sends the data through an enrichment process to turn the data into actionable threat intelligence.

What is curated threat intelligence?

Curated threat intelligence is high-quality, high-fidelity, and highly contextualized threat information that is gathered from a variety of sources, including threat feeds, threat sharing communities, and Tego's own research team. This intelligence is used to enrich security data with additional information, such as threat indicators, malware signatures, and attack tactics, techniques, and procedures (TTPs).

How can I get started with Tego Cyber?

To get started with Tego Cyber, please contact our sales team. We would be happy to help you get started and answer any questions you may have.