Skip to contentAbout Fig Group

Threat Intelligence

Contextual threat feeds mapped to your asset inventory and risk register.

The challenge

Does this sound familiar?

Threat feeds are generic and noisy. Alerts reference assets you don't own or have already patched. Contextual threat information never reaches the teams responding to incidents.

How Fig helps

Threat Intelligence with Fig

Asset-Context Feeds

Raw threat intelligence filtered and scored against your actual asset inventory, supply chain, and geographical risk profile. Noise drops dramatically.

Vulnerability Correlation

Active threat exploits automatically matched to your vulnerability scan results and asset configurations. Prioritisation updates in real-time.

Incident Integration

Threat context injected into incident investigations. Security teams see MITRE-aligned actor profiles, known techniques, and connected risk graphs linking incidents to your assets.

Third-Party Risk

Threat data mapped to your suppliers, partners, and critical dependencies. Early warning when your supply chain is targeted.

Core Capability

Fig integrates with MISP threat feeds natively, scoring and correlating threat signals against your asset inventory and triggering automated response actions based on configurable verdict rules.

Audit-ready workflow

How Threat Intelligence becomes evidence

Threat Intelligence should not be treated as a standalone tool surface. In Fig it is part of a governed workflow: a signal is captured, an owner is assigned, a control or risk is updated, and evidence is retained so the organisation can prove what happened later.

Lifecycle

Where it sits in the operating model

The Protect phase is where this capability sits in the wider Fig operating model. Threat feeds are generic and noisy. Alerts reference assets you don't own or have already patched. Contextual threat information never reaches the teams responding to incidents. Fig turns that problem into a repeatable lifecycle so MSPs, risk teams, and auditors are not relying on static spreadsheets or ad hoc screenshots when a buyer asks for proof.

Evidence captured

What auditors and buyers see

For threat intelligence, useful evidence normally includes the triggering record, the affected asset or supplier, the control requirement, the assigned owner, the decision made, the timestamp, and the outcome. That evidence is mapped back to frameworks such as Cyber Essentials, ISO 27001, NIS2, DORA, GDPR, CMMC, and internal policy requirements where relevant.

Implementation checks

Four steps to roll this out

  • 01Define who owns threat intelligence and what events should trigger review.
  • 02Connect the relevant source systems so evidence is collected continuously.
  • 03Map outputs to the frameworks and policies that matter to the organisation.
  • 04Review exceptions, accepted risks, and overdue actions before audit or renewal.

Useful references

Independent sources buyers and auditors recognise

The exact evidence required still depends on your scope, risk profile, sector, and framework obligations.

Built for you

Who uses this?

MSPs & MSSPs

Contextual threat intelligence standardised across your client portfolio. Client-specific feeds reduce alert fatigue and focus remediation efforts.

Learn more

Security & risk teams

Operational security teams make faster threat decisions with portfolio context. Exec risk summaries show threat landscape impact on your business.

Learn more

Compliance & audit

Evidence of threat monitoring, assessment, and incident response readiness for ISO 27001, DORA, and security control audits.

Learn more

Common questions

Frequently asked questions

What threat sources does Fig integrate with?

Fig ingests feeds from CISA, Microsoft, Shodan, URLhaus, and commercial providers. Feeds are normalised and scored by relevance to your asset inventory and industry.

How quickly does threat context reach incident responders?

Threat updates arrive within 4 hours of publication. Critical threats (zero-days, active exploits) trigger escalated alerts to SOC and security teams.

Can we filter feeds by industry or region?

Yes. Threat feeds are filtered by your industry sector, geographical presence, and technology stack. You only see threats relevant to your actual environment, which dramatically reduces alert fatigue.

Do we need a dedicated threat analyst to use this?

No. Fig does the correlation and filtering automatically. Your security team sees prioritised, contextual alerts rather than raw intelligence. If you do have dedicated analysts, they can dig into the underlying data and build custom correlation rules.

How does threat intelligence feed into our incident response?

When an incident is opened in Fig, relevant threat context is attached automatically. Responders see known actor profiles, MITRE ATT&CK techniques, and indicators of compromise linked to your specific assets, without having to search for it themselves.

Next step

See Threat Intelligence in action.

Book a walkthrough tailored to your frameworks and tooling.