Home Tracking the Online Threat Analysis Centers

Tracking the Online Threat Analysis Centers

While the Homeland Security Department no longer color-codes its threat levels, several security vendors offer up their own dashboards with all sorts of eye candy designed to keep track of which viruses and malware are heading yourway. Here is a brief rundown of the more popular services. All of them rely on agents and collection points scattered across the major Internet peering points and other critical junctions to watch for particular traffic patterns. The idea here is to gain insight into what is happening before something enters your network and starts to hose your equipment or steal your data.

Trend Micro today introduced its Threat Intelligence Manager which uses its database of trends as the basis of several protective, including OfficeScan and Deep Security. The new service leverages the Trend dashboard that can be seen here.

Trend is not the only vendor with such a service. Here are some others that I have used in the past (you are welcome to add your own favorites in the comments, too):

Some of these threat dashboard sites offer more than color-coded icons and long lists of threat descriptions. For example, McAfee’s has an online reputation management system, where you can enter a domain and it will return a host of statistics you can use to judge the domain’s legitimacy.


The TrustedSource site shows you the trends of a particular domain (in this case, Cisco.com) and other relevant information.

All of these sites suffer from some of the same drawbacks. First, there is the needle in the haystack situation. There are hundreds of new attacks each day and most exploits aren’t really going to do much damage. The few big-ticket items are often hidden underneath the copious number of alarms for the minor ones. For those of you that don’t monitor these exploits, it is worthwhile (and somewhat depressing) to take a gander at one of these sites and see how much garbage is streaming through the average router.

Second, there is no standardized virus or threat naming system, so the same threat can be called completely different things by each vendor. This makes cross-site comparisons almost impossible until a virus gains enough notoriety that the press can bring some kind of consistency. Of course, by the time the press gets a hold of something, it might be too late for you to do much about it in terms of protecting your network.

Finally, if you are trying to find a particular patch or security bulletin, you might be better off Googling it than trying to track it down on each site.

About ReadWrite’s Editorial Process

The ReadWrite Editorial policy involves closely monitoring the tech industry for major developments, new product launches, AI breakthroughs, video game releases and other newsworthy events. Editors assign relevant stories to staff writers or freelance contributors with expertise in each particular topic area. Before publication, articles go through a rigorous round of editing for accuracy, clarity, and to ensure adherence to ReadWrite's style guidelines.

Get the biggest tech headlines of the day delivered to your inbox

    By signing up, you agree to our Terms and Privacy Policy. Unsubscribe anytime.

    Tech News

    Explore the latest in tech with our Tech News. We cut through the noise for concise, relevant updates, keeping you informed about the rapidly evolving tech landscape with curated content that separates signal from noise.

    In-Depth Tech Stories

    Explore tech impact in In-Depth Stories. Narrative data journalism offers comprehensive analyses, revealing stories behind data. Understand industry trends for a deeper perspective on tech's intricate relationships with society.

    Expert Reviews

    Empower decisions with Expert Reviews, merging industry expertise and insightful analysis. Delve into tech intricacies, get the best deals, and stay ahead with our trustworthy guide to navigating the ever-changing tech market.