---
name: evaluating-threat-intelligence-platforms
description: 'Evaluates and selects Threat Intelligence Platform (TIP) products based on organizational requirements including
  feed integration capability, STIX/TAXII support, workflow automation, analyst interface, and total cost of ownership. Use
  when conducting a TIP procurement, migrating between TIP solutions, or assessing whether the current TIP meets program maturity
  requirements. Activates for requests involving ThreatConnect, MISP, OpenCTI, Anomali, EclecticIQ, or TIP procurement decisions.

  '
domain: cybersecurity
subdomain: threat-intelligence
tags:
- TIP
- ThreatConnect
- MISP
- OpenCTI
- Anomali
- EclecticIQ
- STIX-TAXII
- CTI-program
- procurement
version: 1.0.0
author: team-cybersecurity
license: Apache-2.0
nist_csf:
- ID.RA-01
- ID.RA-05
- DE.CM-01
- DE.AE-02
---
# Evaluating Threat Intelligence Platforms

## When to Use

Use this skill when:
- Conducting a formal RFP or vendor evaluation for a TIP solution
- Assessing whether the current TIP (e.g., MISP) needs to be replaced or augmented as the CTI program scales
- Establishing evaluation criteria aligned to organizational maturity and budget

**Do not use** this skill for evaluating feed quality independently of the TIP — feed evaluation is a separate workflow focused on data quality rather than platform capabilities.

## Prerequisites

- Documented CTI program requirements: team size, feed sources, integration targets, use cases
- Budget range and procurement timeline
- Technical staff who will administer the platform (Python/API experience for open-source TIPs)
- List of current and planned integrations (SIEM, SOAR, EDR, firewalls)

## Workflow

### Step 1: Define Evaluation Criteria

Structure requirements into mandatory (M) and desired (D) categories:

**Core TIP Functions**:
- M: STIX 2.1 import/export with TAXII 2.1 server
- M: REST API for automated IOC ingestion and export
- M: Indicator deduplication and TTL management
- M: TLP classification enforcement
- D: Built-in MITRE ATT&CK integration and technique tagging
- D: Graph visualization of indicator relationships
- D: Workflow automation for analyst triage

**Integrations**:
- M: SIEM integration (Splunk, Sentinel, QRadar) via syslog, API, or native connector
- M: EDR integration for IOC push (CrowdStrike, Defender, SentinelOne)
- D: SOAR integration (XSOAR, Splunk SOAR) for playbook triggers
- D: Ticketing system (ServiceNow, Jira) for intelligence task tracking

**Operational**:
- M: Role-based access control with TLP-aware data segregation
- M: Audit logging for all analyst actions
- D: Multi-tenancy for MSSP use cases

### Step 2: Evaluate Major TIP Options

**MISP (Open Source)**:
- Cost: Free (self-hosted infrastructure cost only)
- Strengths: Largest community, 250+ modules, extensive ISAC usage, STIX 2.0 native
- Weaknesses: Requires dedicated admin, limited visualization, UI dated
- Best for: Budget-constrained teams with technical staff; government/ISAC sharing programs

**OpenCTI (Open Source)**:
- Cost: Free (self-hosted); paid SaaS at ~$3,000–$15,000/year
- Strengths: Native STIX 2.1, graph visualization, ATT&CK integration, modern API
- Weaknesses: Resource-intensive deployment (Elasticsearch, MinIO required)
- Best for: Teams wanting open source with modern UX; SOC/CTI integration focus

**ThreatConnect (Commercial)**:
- Cost: $50,000–$500,000/year depending on scale
- Strengths: End-to-end CTI lifecycle, playbook automation, TC Exchange marketplace, analyst workflow
- Weaknesses: High cost; complex implementation; best value at larger scale
- Best for: Mature enterprise CTI programs; MSSPs; red team/blue team integration

**Anomali ThreatStream (Commercial)**:
- Cost: $30,000–$200,000/year
- Strengths: Strong feed aggregation, Splunk-native integration, extensive pre-built connectors
- Weaknesses: Graph visualization weaker than OpenCTI; UI refresh lagging
- Best for: Splunk-heavy environments; teams prioritizing feed volume over analysis workflows

**EclecticIQ Platform (Commercial)**:
- Cost: $40,000–$300,000/year
- Strengths: STIX 2.1 native, collaborative intelligence workbench, strong European customer base
- Weaknesses: Smaller partner ecosystem than ThreatConnect
- Best for: Teams with MITRE ATT&CK-centric workflows; EMEA-focused organizations

### Step 3: Conduct Proof of Concept

Request 30-day PoC from finalists. Test:
1. Feed onboarding: Can your top 5 feeds be ingested within 4 hours?
2. SIEM integration: Can enriched IOCs push to your SIEM in <5 minutes?
3. ATT&CK mapping: Can analysts tag indicators with ATT&CK techniques efficiently?
4. Report generation: Can the platform produce a tactical IOC bulletin with one click?
5. API performance: Can the REST API handle 10,000 indicator queries per day?

### Step 4: Score and Select

Use weighted scoring matrix (weight each criterion by organizational priority):
```
Criterion                 Weight   Vendor A   Vendor B
STIX 2.1 compliance       20%      95         85
SIEM integration          25%      90         70
ATT&CK mapping            15%      85         95
Cost (inverse)            20%      60         90
UI/analyst experience     10%      80         75
Vendor support quality    10%      85         80
TOTAL                     100%     82.0       81.5
```

### Step 5: Implementation and Onboarding Planning

Plan 90-day implementation:
- Week 1–2: Infrastructure deployment (cloud or on-prem)
- Week 3–4: Feed onboarding and deduplication tuning
- Week 5–6: SIEM/SOAR integration and testing
- Week 7–8: Analyst workflow configuration and training
- Week 9–12: Operational validation and go-live

## Key Concepts

| Term | Definition |
|------|-----------|
| **TIP** | Threat Intelligence Platform — software for collecting, processing, analyzing, and disseminating cyber threat intelligence |
| **TAXII Server** | Component of a TIP that serves STIX bundles to consuming systems on request |
| **TC Exchange** | ThreatConnect's commercial marketplace for pre-built feed integrations and app connectors |
| **Multi-tenancy** | TIP capability to serve multiple organizational units or customers with isolated data environments |
| **Deduplication** | Process of identifying and merging duplicate indicators within a TIP to reduce analyst noise |

## Tools & Systems

- **MISP**: Open-source TIP used by 6,000+ organizations; strongest ISAC/government community integration
- **OpenCTI**: Modern open-source TIP with native STIX 2.1 and graph-based analysis
- **ThreatConnect**: Enterprise commercial TIP with lifecycle management and SOAR playbook integration
- **Anomali ThreatStream**: Commercial TIP with strong Splunk ecosystem integration
- **EclecticIQ**: Commercial TIP with ATT&CK-centric workflow design

## Common Pitfalls

- **Selecting TIP before defining requirements**: Technology selection before use case definition leads to expensive mismatches.
- **Underestimating administration burden**: MISP and OpenCTI require dedicated admin time (minimum 0.25 FTE); budget accordingly.
- **Ignoring data migration costs**: Moving historical intelligence from one TIP to another is costly and often impractical for legacy systems.
- **Not testing SIEM integration in PoC**: TIP value depends heavily on downstream integration quality; always test SIEM/SOAR connectivity during evaluation.
