Alligence Engine

The dynamic, one-to-many engine

Actionable Intelligence = Alligence

The concept of threat intelligence is not a new one, as security responsible personell look to valuable ways to share information to strengthen their cybersecurity posture. In fact, we use threat intelligence as an input to derive relevant attack intelligence. Intelligence feeds such as Splunk, Brandefense, or AlienVault, for example, are ingested to add context to events and alerts, reduce false positives, and detect other attack vectors as “outside the perimeter” events are monitored at the same time, by continuously scanning the dark, deep, and surface web, to discover unknown events, automatically prioritize risks, and deliver actionable intelligence that can be used instantly to improve security.

What is unique and new, however, is our Alligence Engine. Think of it as swarm intelligence. This approach delivers a way to share behavior-based threat intelligence that automates time consuming investigation steps and integrates human insights that allow member of security teams or security analysts to accelerate response based on risk — all at network speed.


Actionable intelligence, as enabled by Artefaktum’s collective defense platform Alligence Engine, provides both big-picture threat context and tailored, sector-specific intelligence that is actionable immediately. In contrast to traditional threat intelligence platforms, which provide only hierarchical sharing capabilities, actionable attack intelligence enables dynamic, one-to-many communication.

As multiple connected swarm spots generate new attack intelligence around correlated threats across their environments, they can be part of the solution, not just spectators.

Having insight across the whole attack surface that impacts your organization allows you to obtain timely, pertinent, and actionable intelligence. That transparency needs to extend beyond one company. The only method to provide actionable intelligence with specific, situational context is to have a dynamic perspective of attacks as they happen at similar organizations, inside a sector, across a geographic area, across your supply chain, and/or across other sectors.