Product
Kenisha Liu
Jun 20, 2023
Let us introduce you to the latest upgrade in threat prevention with our new Fletch Threat Boards.
Fletch Thread Boards provide you with comprehensive, in-depth insight into each individual threat you are exposed to before you are impacted. You’ll get a deep dive into what the threat is, why you are exposed, how to mitigate and prevent damage, and how to communicate this data. It’s a unique capability of the Fletch Engine to discover threats early and track threat evolution .
Whether you are a security analyst, IT manager, or business owner, Threat Boards will equip you with the knowledge and tools necessary to make informed decisions and safeguard your company. In the past, to get this information, you’d need a large team, expensive software, a lot of online searches, forums and friends, and spreadsheets. Now it is available immediately in Fletch as a threat emerges and evolves.
Read on for more information and features below.
How does the Fletch Threat Board work?
When you log into Fletch, you’ll be brought to the Fletch Feed which has prioritized all the threats in the landscape that are relevant to you based on correlation to your tech stack, industry, or geographical location.
Why are there so few threats on my Fletch Feed?
Firstly, only a few are actually relevant to your business. Secondly, Fletch's AI engine will smartly group the articles, advice, correlation tags, and IOCs that come to be associated with the same threat, as it evolves with different attack tactics into one threat board. This is called a Threat Collection.
Navigate to a Fletch Threat Board from your personalized Fletch Feed by clicking on any of the threats you’re interested in. Once the Threat Board opens for that threat collection, you’ll find a dashboard of real-time data and mitigation strategies.
Learn more about how the Fletch Feed works, here.
Features of Fletch Threat Boards
As the go-to wiki for every threat on your horizon, you’ll have a holistic breakdown of the threat collection with real-time updates as it evolves. Take a look at some of the features you’ll find:
1. Threat board header
Find quick updates on everything new as it affects your world right away.
These indicators are unique to Fletch, so you have the most comprehensive and accurate data on any given threat. The header of the Fletch Threat Board includes:
Your correlation. Fletch tags every threat with your data the threat is targeting whether it's tech, geo, industry, or any malware or vulnerabilities.
Severity. See the how sever the threat is from low, medium, high, to severe so you can make quick judgement calls on what to prioritize.
Chatter. This metric comes directly from the sentiments of the cybersecurity community based on fluctuations in conversation and the volume of exploits. The louder the chatter, the more serious the threat is right now.
Fletch top advice. When you're in a rush, our top remediation advice is at the top so you can provide a quick and immediate response.
Safeshare. Securely share the information on the given threat without sharing any of your personal data on the Threat Board
2. Your Correlations
Your correlations breaks down every point in which you may be susceptible to this specific threat.
Multifaceted and personalized, every threat is correlated with your data to figure out how much of a threat each one is to you right now. The greater a threat is to you the more items that will appear under technology, industry, or geo. Not all threats will target every type of correlation. For example, you may run into a threat that is only targeting an industry and is not geo or tech related.
And if you have vulnerability scanners or an endpoint detection and response tool, you can see the total number of resources that are vulnerable or if malware has been identified as a threat matures.
Pro Tip: Fletch can only show you your correlations based on the data you have connected to the software. Connect more data for a more comprehensive overview of your threats.
3. Summary
Use Summary to get a full breakdown of the details generated by our experts and Fletch AI. Never worry about spending hours searching online to figure out what a threat is about.
Summary consolidates all the data from every reputable online source to bring you a digestible analysis of what the threat is, why you should be aware of it, and how it affects you.
You can see the most recent update on the threat and the history and evolution of threat from emergence. Dig even deeper by clicking on our aggregation of links about the threat.
4. Fletch beta feature: Expert Advice
On top of giving you data on the threat, you can also get expert mitigation strategies and actionable insights on how to protect yourself from every threat on your horizon.
Broken down into short-term and long-term actions, our expert advice is up-to-date techniques as a threat evolves on how to prevent the threat from affecting your business. The advice comes from our cybersecurity experts partnered with machine learning and expert natural language processing. To get this type of advice you’d have to build a big team and have a lot of resources, now you have immediate access to the best advice for every threat.
Pro tip: Open advice history to see how our recommendations have changed as the threat evolved.
5. Fletch beta feature: Communication
We know that a core responsibility of your role is keeping everyone up to date on threats. That’s why we created the communication feature.
On the right hand side of Threat Boards, pick your audience in the dropdown menu to generate targeted communication about the threat that you can copy and paste into an email in seconds instead of spending time researching and crafting what to say to each group you have to inform.
6. Details
Under Details you’ll find more information on the threat to empower you with all you need to remediate this threat and safeguard your organization.
There are four tabs that will allow you to see all the indicator and machine specific information:
The ‘New' tab shows you only CVEs and malware indicators that are new to Fletch, grouped by machines and updated daily.
The ‘All Resources’ tab shows you all your machines and the CVEs and malware indicators your scanner or EDR found on them.
Check out the ‘Vulnerabilities’ and ‘Malware’ tabs to see a list of all CVEs and malware indicators your scanner or EDR found across your environment.