What is it?
where many different components work together to gain threat intelligence. This system will gain data from OSINT data sources, proprietary closed source intelligence, and vulnerability databases. These systems can also include threat maps
Why is it mentioned?
These systems ingest a huge amount of data, to make it understandable for organisations so they can actually extract the value from all the data.