Premium module · Micro- ADD-ON

Intelligentcustoms

MicroSIEM's analytical brain. Threat intelligence from multiple sources, exploit detection with Bayesian confidence scoring and virtual patching for legacy systems.
Exploit Detection Engine
Multi-source correlation: IoC matching, behavioral analysis (eBPF), pattern recognition from Metasploit/PoC, timeline correlation.
Confidence Scoring Bayesian
Low (0–30%) → Medium → High (70–90%) → Confirmed (90–100%). Each evidence accumulates in a rigorous probability calculation.
Virtual Patching
For non patchable legacy systems: IDS/IPS-like rules, application-level filtering, network isolation. Native integration with Firedog.
Threat Hunting
500+ Sigma Rules preconfigured, custom query builder, historical IoC research on 30–90 days, automatic zero-day campaigns.
MITRE ATT& CK mapping
Adversary technique identified → specific countermeasures. Weekly digest potential threats. Alert retroactive on historical logs.
IoC Local Database
~100.000 IoC (IP, domain, file hash, YARA rules). Update every 4 hours. Match latency <50ms for 10k log lines.
Threat Intelligence
Licenses Pro
€ 300/year
Payed annually

From reactive monitoring to threat hunting proactive

Through integration with global intelligence sources (MISP, Shodan, AlienVault OTX) and advanced behavioral analysis, Intellidog answers the critical question that each security team poses: "Is this vulnerability just theoretical or is someone already trying to exploit it on my systems? "

Integrated sources for coverage complete

MISP (community + private) AlienVault OTX Shodan VirusTotal AbuseIPDB Custom STIX 2.x feeds
Virtual Patch Lifecycle

Immediate protection without patch patch official official

01

Detection

Critical vulnerability without patch available (e.g. EOL legacy system).

02


Analysis

Intellidog analyzes exploit vectors and generates mitigation rules.

03

Testing (alert mode)

Deploy in log-only mode for 24–48h. Zero blocks, just observation of false positives.

04

Blocking activation

If zero false positives → activation blocking mode. Tentative exploits blocked and logged.

05


Decommissioning

When official patch available, virtual patch removes. The cycle closes.

Frequently Asked Questions

Contact us
Mon – Friday, 10-19 PM

CONTACT US

Contact Sales Team

EnglishenEnglishEnglish