Sources play a critical role in the operation of ThreatKey, serving as points of data ingestion from diverse environments such as SaaS applications, infrastructure platforms, and other security tools. This guide is designed to help you understand the process of connecting a source to ThreatKey, thereby enhancing your security analysis and risk management capabilities.
Steps to connect a source
Navigate to the Sources Page: Begin by visiting the sources page on the ThreatKey platform. You can access this page by clicking on the following link: https://app.threatkey.com/environment/sources.
View All Available Sources: Once you are on the sources page, you will find a list of available sources. To view the full list of sources, click on the "See all available" button. This will display a comprehensive list of potential sources that you can connect with ThreatKey.
Connect to a Source: After you have selected the source you want to connect, locate the "Connect" button next to the source's name. Click on this button to start the connection process. Follow the guided steps to complete the connection between your chosen source and ThreatKey.
By connecting a source to ThreatKey, you are enriching your security analysis capabilities and strengthening your overall security posture.
If you encounter any issues or have any questions during the process of connecting a source, don't hesitate to reach out to our expert support team. They're available every day to ensure you have a smooth and efficient experience with ThreatKey. You can reach them at firstname.lastname@example.org or through our live chat.
Empower your security management with diverse data ingestion by connecting a source to ThreatKey today.