Threat Intelligence

The leading providers of Threat Intelligence solutions in APAC
  • AI-driven Threat Intelligence Platform
  • Surprisingly cost-effective
  • World-class experts with tailored recommendations

GET YOUR QUOTE

What is Threat Intelligence ?

Threat intelligence is data that is collected, processed, and analyzed to understand a threat actor’s motives, targets, and attack behaviors. Threat intelligence enables us to make faster, more informed, data-backed security decisions and change their behavior from reactive to proactive in the fight against threat actors.

Threat intelligence benefits organizations of all shapes and sizes by helping process threat data to better understand their attackers, respond faster to incidents, and proactively get ahead of a threat actor’s next move
Discover the latest cyber threats with Threat Intelligence
Lorem ipsum dolor sit amet?
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aliquam leo leo, tincidunt ac lectus vel, tincidunt scelerisque sapien. Quisque commodo orci at odio aliquet pretium. Sed 

4

Lorem ipsum dolor sit amet?
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aliquam leo leo, tincidunt ac lectus vel, tincidunt scelerisque sapien. Quisque commodo orci at odio aliquet pretium. Sed 

5

Lorem ipsum dolor sit amet?
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aliquam leo leo, tincidunt ac lectus vel, tincidunt scelerisque sapien. Quisque commodo orci at odio aliquet pretium. Sed 

6

Banking, Finance services, Insurance company
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aliquam leo leo, tincidunt ac lectus vel, tincidunt scelerisque sapien. Quisque commodo orci at odio aliquet pretium. Sed 

1

Ecommerce website
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aliquam leo leo, tincidunt ac lectus vel, tincidunt scelerisque sapien. Quisque commodo orci at odio aliquet pretium. Sed 

2

Lorem ipsum dolor sit amet?
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aliquam leo leo, tincidunt ac lectus vel, tincidunt scelerisque sapien. Quisque commodo orci at odio aliquet pretium. Sed 

3

Who is recommended ?

Key features

Hundred of curated sources
Threat data collected from social network, forum, deep/dark web, ISP; collected during implementation of IS services; collected during internal researches on tracking APT Group/Campaign or zero-day or 1-day vulnerabilities.


24/7/365 customer support
24/7/365 technical support team, the leading cyber security experts , is always willing to help. Customers can contact to support team via email, hotline,...
Real-time threat alert system
Automatic tracking and immediate notification of customer about specific threats that help customers have information and effective treatment plan even before an attack on information systems occurs.


Gain insight of potential threats to protect your business, thus improve security intelligence to combat potential threats in your environment.

of our Threat Intelligence

Threat Collection

Collect information about network security threats from many sources, especially from private, secret, and uncommon sources for analysis and alert

Threat Feeds

Provide Machine Readable Threat Intelligence (MRTI) through Threat
Feed (IP, domain, hash, etc.) according to STIX/TAXII standards for solutions such as SIEM, IPS/IDS, Antivirus, etc.

Threat Scoring

Give evaluation and assessment of threat alert by scoring and labeling the severity level based on experts’ method to help customer make proper response to threats

Global Threat Report

Real-time update the latest cybertheats all over the world: Top trending events, threats of cybersecurity; Active cyber-attack groups, malwares, prevailing attack methods; The vulnerabilities are being used, exploited or interested.

Brand Monitoring

 Information related to customer’s brand or reputation are collected and given alerts. Customers can subscribe to receive alerts about threats that target their brand. So that, customers can prevent data breaches at the earliest possible stage.

Threat Scoring

Provide information about threats, also assess and score to identify hazards. In addition, the system also allows to display information about objects related to that threat in chart form to support in-depth investigation and prevention.

Viettel Threat Intelligence Features

VIETTEL THREAT INTELLIGENCE’S SERVICE PACKAGES

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aliquam leo leo, tincidunt ac lectus vel, tincidunt scelerisque sapien. Quisque commodo orci at odio aliquet pretium.
Make monthly and quarterly reports on cybersecurity situation
Report
Provide 24/7 support
Support Service
Issue alerts about malware that potentially threat organizations (sector, country, etc.)
Description
Features
Brand Monitoring
Data Leak
Compromised Systems Alert
Fraud Alert
Vulnerability Actionable Response
APT Alert
Malware Alert
Give the latest alerts and possible solutions, along with alert signs of exploiting vulnerabilities to help customers identify those threats by themselves
Issue alerts about targeted attack groups that potentially threat customer (sector, country, etc.)
Phishing Websites, Impersonate Websites, Social Media Impersonates, Takedown Request, Rouge Website/Cyber Squatter, Look like domain
Provide information about stolen and leaked data on forums, black markets, etc. related to customers
Provide an alert message about the customers' infrastructure connected to the malicious
infrastructure.
Provide information about service vulnerabilities and abnormally opened ports of the organization's public domain/IP
Provide information about financial fraud, including fraud in account and passwords data
on online transactions and fraud in data of bank card, card number, card type
Provide information on objects and threats for SIEM, EDR, etc. to increase detection capabilities for the organization
Machine Readable Threat Intelligence
Alert
Send alerts via portal and email
1
2
3
4
5
6
7
8
9
10
11

Your trusted partner - Guaranteed by the best!

2022 Vietnam Cybersecurity Services Company of the Year
 11 Gold Awards Cybersecurity Excellence Awards 2023
13 Gold Awards Cybersecurity Excellence Awards 2022

World-class cybersecurity experts always at your side

• Microsoft
• Google
• Zimbra
• Facebook
• BugCrowd
• Telerik
• Mattermost
• LimeSurvey
• Paypal
• Richfaces
• Cisco
• Chrome
• Tesla
• Okta
• Twilio
• Struts
About 400 Zero-day detected in various platforms

Our team work 24/7 to ensure the absolute safety for customers in every countries no matter sizes

• Top 1 in Twilio Bug Bounty Program
• Top 3 of BugCrowd researchers
• Top 10 in Paypal Inc. Bug Bounty Program
• Top 20 in Microsoft Bug Bounty Program
• Top 30 in Tesla Bug Bounty Program
• Top 70 in Facebook Bug Bounty Program.
Hall of Fame in Big Bug Bounty Program
• Top 5 of Pwn2Own 2020 in Tokyo - Japan
• Top 5 of Pwn2Own 2021 in Vancouver - Canada
• Top 2 of Pwn2Own 2022 in Toronto - Canada
• Top 3 of Pwn2Own 2023 in Vancouver - Canada
Winners of Pwn2Own

and 300+ Organisations, MNCs, SMEs, MCSTs & Non-Profits around the globe

Vulnerability Assessment vs Penetration Testing

Understand the differences to know which is suitable
Vulnerability Assessment
  • Identify all the security vunerabilities in the system and give recommendations
  • Focus: Lists known software vulnerabilities that could be exploited
  • Scope: Wide, broad, scanning the surface
  • Performed by: Automated tools with experts oversight
  • Best for: Understanding basic level of security postures, starting point for testing security
Penetration Testing
  • Identify critical security breaches and demo system penetration
  • Focus: Discover unknown and exploitable weekness
  • Scope: Deep, focused
  • Performed by: Experienced ethical hackers to stimulate how real attackers will do
  • Best for: Understanding all facets of security posture

Speak with our experts to know more

OUR CERTIFICATIONS

Save your time with our experts

If you have any questions, don't hestitate to contact our expert.

"Viettel Cyber Security embodies three major features we judges look for to become winners: understanding tomorrow's threat, providing a cost-effective solution; and innovating in unexpected ways that can mitigate cyber risk and get one step ahead of the next breach"



Gary S.Miliefsky, Publisher of Cyber Defense Magazine

SPEAK WITH OUR EXPERT


Viettel Cyber Security Company - Branch of Viettel Group

Official address: No 1 Tran Huu Duc Street, My Dinh 2 Ward, Nam Tu Liem District, Hanoi, Viet Nam.

• Headquater in Hanoi: 41F, Keangnam Landmark 72, Pham Hung St., Nam Tu Liem Dist., Hanoi, Vietnam.
• The Southern Office: Floor 32F - Viettel building, 285 Cach Mang Thang Tam Street, Ward 12, District 10, Ho Chi Minh City, Vietnam
We will reply you as soon as possible

Thank you for contacting us

SPEAK TO A PENTEST EXPERT

LET'S GET IN TOUCH!
To know if your data and digital asset are truly secure