@@ -83,49 +83,48 @@ Good option if you need granular policy control and want to avoid cross-tenant s
8383
8484---
8585
86- ## SIEM/SOAR Integration
86+ ## Looking for complementary IOC streams
8787
88- Enrich existing security tools with CrowdSec's real-time threat intelligence and IOC streams from 70,000+ global contributors.
88+ Add qualified IOCs from CrowdSec's real-time IP reputation.
8989
9090** Is it for me?**
91- Ideal if you're using SIEM/SOAR tools and want to enhance them with fresh, crowd-sourced threat intelligence .
92- Good option if you need automated IOC management and want to reduce false positives in security alerts .
91+ Ideal if you want to complement your IOC insights with exclusive CrowdSec IP reputation data .
92+ Quickly choose among qualified malicious actors regrouped by industry, behaviors.. .
9393
9494** How it works:**
95- - Import custom IOCs from your existing tools using CSV / JSON format .
96- - Configure notification plugins to automatically enrich alerts with contextual threat data.
97- - Use CTI helpers in templates to add global intelligence context to security events.
98- - Set up bidirectional data exchange with platforms like MISP for comprehensive threat sharing.
95+ - Stream CrowdSec IP Lists into your security tools.
96+ - Integrate directly in your security tools thanks to our integrations or easy to use CTI API.
97+ - 🏅 Get custom IOC streams made for your needs.([ contact us ↗️] ( https://www.crowdsec.net/business-requests?interest=CTI%20subscription ) )
98+ - Next step: Enrich IPs via CrowdSec CTI API.
99+
99100
100101** References**
101- - [ Import decisions from CSV/JSON ] ( /docs/next/cscli/cscli_decisions_import )
102- - [ Notification plugins configuration ] ( /docs/next/notification_plugins /intro )
103- - [ CTI helpers in templates ] ( /docs/next/notification_plugins/template_helpers )
104- - [ Console enrollment for CTI access ] ( /docs/next/cscli/cscli_console_enroll )
105- - 🏅 [ MISP Integration documentation ] ( /docs/next/integrations/ misp) (Coming Soon )
102+ - [ IP reputation lists / Blocklists Catalog doc ↗️ ] ( https://app.crowdsec.net/blocklists/search )
103+ - [ Retrieving merged lists via HTTPS endpoints ] ( /u/integrations /intro )
104+ - [ Retrieving Blocklists via API ] ( /u/console/service_api/quickstart/blocklists#download-blocklist-content )
105+ - [ MISP Feed from Security Engine's alerts ] ( https://doc.crowdsec.net/u/bouncers/misp-feed-generator )
106+ - [ Upcoming CrowdSec MISP Feeds ↗️ ] ( https://roadmap.crowdsec.net/c/48- misp-feed )
106107
107108---
108109
109110## Web Application Protection
110111
111- Quickly protect web applications from OWASP Top-10 attacks and zero-day vulnerability probing with behavior-driven detection.
112+ Quickly protect web applications from the latest CVEs and generic vulnerability exploits using CrowdSec WAF.
112113
113114** Is it for me?**
114- Ideal if you need immediate protection for web applications against common attack patterns.
115- Good option if you want virtual patching capabilities and real-time threat blocking without modifying application code .
115+ Ideal if you want a modern OpenSource WAF solution.
116+ Benefit from CrowdSec's Virtual patching catalog while being able to use your existing ModSecurity rules as is .
116117
117118** How it works:**
118119- Deploy CrowdSec Security Engine with AppSec module on your reverse proxy or web server.
119- - Enable pre-built AppSec collections targeting OWASP Top-10 attack patterns.
120- - Configure bouncers for real-time blocking of detected threats.
121- - Implement virtual patching rules to protect against specific vulnerabilities.
120+ - Get CrowdSec Virtual patching collection.
121+ - Easily scale and identify behaviors accross multiple servers over time.
122+ - Go further by using your existing appsec rules.
123+ - Even test CRS rules out of band on your production traffic to easily adapt them to you needs.
124+
122125
123126** References**
124- - [ Complete WAF setup guide] ( /u/user_guides/waf_rp_howto )
125- - [ AppSec configuration guide] ( /docs/next/appsec/configuration )
126- - [ Virtual patching with AppSec rules] ( /docs/next/appsec/configuration )
127- - [ Bouncer configuration] ( /docs/next/cscli/cscli_bouncers )
128- - [ Security Engine installation] ( /u/getting_started/installation/linux )
127+ - ...
129128
130129---
131130
0 commit comments