Threat Intelligence Data definition

Threat Intelligence Data means any malware, spyware, virus, worm, trojan, or other potentially malicious or harmful code or files, URLs, DNS data, public IP addresses, network telemetry, commands, processes or techniques, tradecraft used by threat actors, metadata, or other information or data, in each case that is potentially related to unauthorized third parties associated therewith and that:
Threat Intelligence Data means any malware, spyware, virus, worm, trojan, or other potentially malicious or harmful code or files, URLs, DNS data, public IP addresses, network telemetry, commands, processes or techniques, tradecraft used by threat actors, metadata, or other information or data, in each case that is potentially related to unauthorized third parties associated therewith and that: (i) Customer provides to Arctic Wolf in connection with this Agreement, or (ii) is collected or discovered during the course of Arctic Wolf providing Solutions, excluding any such information or data that identifies Customer or to the extent that it includes Personal Data (as defined below) of the data subjects of Customer (but including personal information of threat actors).
Threat Intelligence Data means Customer de-identified data extracted or generated by the Service from Customer Data (i.e., from the malicious emails such as the third-party bad actor’s IP address, email, and name) that do not constitute Customer Data themselves.

Examples of Threat Intelligence Data in a sentence

  • Elastic uses Threat Intelligence Data for threat analysis and mitigation, customer support, product management and improvement, and research and development.

  • Elastic does not share Threat Intelligence Data with third parties.

  • If Supplier has deployed Threat Intelligence, Eurofins may request resulting Threat Intelligence Data to be shared.

  • The following sections, together with any other terms necessary for the interpretation or enforcement of this Agreement, will survive termination or expiration of this Agreement: 1 (Definitions), 4.5 (Confidentiality) for five (5) years, 4.6 (Usage Data and Threat Intelligence Data), 5 (Ownership Rights), 6 (Payment; Taxes: Monitoring), 7 (Warranties; Disclaimers; Limitation of Liability), 8 (Indemnification), 9.3 (Effect of Termination), 9.5 (Customer Content upon Termination), and 11 (General).

  • If Customer has deployed endpoint security, the Product(s) may provide Threat Intelligence Data (defined below) to Elastic.

  • Eurofins uses Threat Intelligence Data for threat analysis and mitigation, customer support, Software/Articles management and improvement, and research and development.

  • Company uses and discloses Customer Data for the purpose of (x) providing the Service to Customer, and (y) generating Threat Intelligence Data; Customer grants Company a limited license during the Subscription Term to use Customer Data to do each of the foregoing (x) and (y).

  • Company owns and retains all right, title, and interest in and to the Service and Threat Intelligence Data.

  • Sophos may collect, access, use, process, transmit, or store Usage Data and Threat Intelligence Data for: (a) product improvement; (b) research and development purposes; and (c) deriving statistical data using information that is aggregated, anonymized, de-identified, or otherwise rendered not reasonably associated or linked to an identifiable individual or to Customer or Users (“Statistical Data”).

  • Fahmida Rashid, “Microsoft Testing Real-Time Botnet Threat Intelligence Data Feed,” eWeek, January 12, 2012.

Related to Threat Intelligence Data

  • Due Diligence Materials means the information to be provided by Seller to Purchaser pursuant to the provisions of Section 4.1 hereof.

  • Environmental Management System means an environmental management system or plan of management to address all environmental risks and to ensure compliance with all Environmental Laws and licences;