Loading . . .
tdm

Threat Detection Marketplace™

Advance your Security Analytics with the largest content marketplace in the world. Used by 3000+ organizations and 6000+ security specialists in 139+ countries. Sourced by Community, SOC Prime and the global Threat Bounty program.

Gartner, Cool Vendors in Security and Risk Management, 2H19, Prateek Bhajanka, Dionisio Zumerle, Augusto Barros, Toby Bussa, 3 October 2019 Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

tdm

Get content to enable Security Use Cases

L1-L2 SOC content
Proactive Exploit Detection
Data Integration with ECS
Threat Hunting bundles
Cloud Security Monitoring

All detections aligned to MITRE ATT&CK™

Threat Detection Marketplace
helps you to maximize your SIEM capabilities and enhance them with MITRE ATT&CK methodology and Sigma language. Enable real-time forensics and threat hunting at the speed of thought for 215 Techniques. Support and easy integration with the Elastic stack, ArcSight, Qradar and Splunk.

View SOC Use Cases
Join the Global Community for Free

28000+ content items for you to choose from with a free community access. All you need for registration is a corporate email.

Invite a Friend to Get Exclusive Content

Sharing is caring: refer a friend to register at tdm.socprime.com and you both will receive an exclusive rule of your choosing for free.

Upgrade to Premium Tier fit for You

We got you covered: from specific rules and parsers to 24x7 support, API and premium applications. There is a subscription Tier for everyone.

Earn Money with Threat Bounty

The opportunity to generate a steady income by writing threat detection rules. Join the defenders that work together for the better cyber security!

  • Sigma rules with ATT&CK tags
  • Kibana dashboards configs
  • Machine Learning Recipes
  • Alerts for X-Pack Watchers
  • Logstash configuration files
  • SaaS & IaaS API integration

Over 93% of content in TDM has been mapped to Tactics, Techniques and Procedures used by adversaries since 2016. Search and deploy content relevant to your threat profile. Bring in the context for security investigations and threat hunting.