Firewall integrations

Fortinet

Elevate the power of your Fortinet Fortigate Firewall using by adding our Intelligence.

Palo Alto

Palo Alto Firewalls can be hardened with our threat intelligence as well.

Sophos XGS

Enhance the Sophos XGS Firewall with our threat intelligence.

OPNsense

Enhance your OPNsense Firewall with our threat intelligence using the native plugin.

SIEM integrations

Splunk

Splunk is a great platform, but without the right Threat Intelligence it's just a log server. Try our threat intelligence today. 

Microsoft Sentinel

One of the most used SIEM solutions should be enriched with the right Intelligence. At Q-Feeds you're at the right place!

Other

Luckily there are many other SIEM vendors whom support 3rd party threat intelligence.

Threat Intelligence Portal

Darkweb Monitoring

Darkweb monitoring is one of our services, not only for threat intelligence but also for you most important assets.

Threat Lookup

With Threat Lookup you get full insights in our IOC database, including full MITRE ATT&K mapping.

External Attack Surface Management

A toolset to check your external facing assets exposed on the internet

Vulnerability Scanner

A comprehensive vulnerability scanner which can scan your infrastructure and web applications

Brand Protection

Protect your brand for look-a-likes and potential phishing attempts

Services

TAXII Feeds & Server Software

TAXII/STIX2.1 standard. Both in form of feeds and server software available

Implementation

Need help with implementations? No worries, we have a strong network of partners who are able to help you.

Solutions

Enrich my SIEM

Elevate the power of your SIEM solution using by adding our Intelligence.

Enrich my Firewall

Firewalls can be hardened with our threat intelligence as well.

Prevent phishing

Enhance your protection against phishing

Achieve compliancy

Achieve compliancy by correlating the best threat intelligence to your logs

Futuristic eye design with circuits and geometric shapes.

Company

About

Read here all about Q-Feeds

News and Updates

Cybersecurity news and updates about us

Publications

All of our media coverage in one place

Become a reseller

Strengthen your portfolio with our comprehensive reseller program

Partner locator

Find our certified partners here

Contact

For all your questions or inquiries

Neural network representation of a human brain

Support

My Account

Access your account and manage your licenses

Downloads & Manuals

On this page you find white papers and manuals

Knowledge base

Our knowledge base full of implementation instructions

Start for free

Start your cyber security intelligence journey here

Abstract geometric wireframe human head

Other SIEM solutions

Obviously there are many SIEM solutions in the world. And unfortunately we're not able to create a dedicated landing page for all of them. Luckily we're able to describe how it works. 

How it works

Multi eyed principle

The "Multi-Eyed Principle" is an approach that emphasizes using multiple sources of threat intelligence to enhance the security and effectiveness of an existing firewall. By incorporating diverse threat intelligence feeds, you can achieve a more comprehensive and robust defense against cyber threats. Here’s how the Multi-Eyed Principle can be applied when adding threat intelligence to a firewall. 

N

Multiple sources of IOCs

Commercial, OSINT, Governmental combined in one firewall

N

Simple 4-step implementation

Implementation is fast and easy with our 4-step manuals. And a POC is completly free.

Abstract colorful swirling lines pattern
Document analysis with magnifying glass icon

Enhanced Threat Detection

Cross-reference threat information to reduce false positives and identify genuine threats more effectively.

Video call icon on laptop screen

Computer Chips

Your content goes here. Edit or remove this text inline or in the module Content settings. You can also style every aspect of this content in the module Desi

Flowchart diagram with interconnected nodes and lines

Increased Resilience

Ensure continuous protection by relying on multiple sources, reducing the risk of blind spots in security.

Brain and gear integration icon

Improved Incident Response

Faster and more precise response right on the edge of your network, saving time on investigations internally.

one threat intelligence set to rule them all

Curator

Cybersecurity companies are basicaly data processing companies. To block something, first you need to know what to block. By combining all the knowledge in the world from lots of different vendors you get the threat intel set to rule them all.

Pink liquid glowing cube on white platform
Abstract geometric structure with cubes and blue lines

Clients

We work with a wide variety of industries & users

Threat Intelligence comes in many different form factors. We provide them in a uniform way. We specific sources for to block the darkweb, phishing related entities, mobile threats, ICS threats, etc. We also provide them in various forms so you can easily implement them with you existing cybersecurity infrastructure.

N

Multiple use cases like Botnets, ICS, Mobile, Phishing, Malware etc.

N

Various ways to implement without the need of many resources

Have a custom project?

Please reach out and we're sure we find a way to implement our knowledge in your cybesecurity infrastructure.

Browse existing case studies and products

Ask our sales representatives about our running projects. Due to security and privacy reasons we are currently not allowed to publish them on our website. But we do have very exciting use cases for our Threat Intelligence.