Skip navigation
All Places > Technology > Security Community > Advanced Threats > 3rd Party Integration > Blog

The ThreatGRID Transform Pack developed by Malformity Labs enables security responders, analysts, and researchers to access and visualize unique malware content from ThreatGRID in combination with other data sets to accurately inform defensive measures in an organization, provide more context to an alert, quickly enumerate capabilities of threat actor groups, and build out anti-malware infrastructure more cost effectively using 32 transforms.


Example integration screenshot:

Picture 3.1.png


Link: ThreatGRID | MalformityLabs LLC

AuthorsMichael Auger, Nicholas Frangia - Advanced Threats Security Solution Architects

From members of the Cisco Advanced Threats Security Solution Architecture team, specifically Michael Auger and Nicholas Frangia, a set of Chrome plugins have been developed that allows a user to search the AMP Threat Grid, and OpenDNS cloud platform for samples that match on an IP address, file hash, or host name, from within the Chrome web browser.


IMPORTANT TO NOTE:  You need a valid user id and password to log into the AMP Threat Grid platform and/or OpenDNS. 


Imagine that you are looking at a web console, or a research web page on a blog.  By simply selecting a piece of text on a web page, and right hand clicking, the option exists use the selected text as search criteria.





In seconds, the results are shown inside the AMP Threat Grid portal:


This valuable extension enables security operations personnel, incident response analysts and threat intelligence specialists to quickly ascertain if an IP address, or a host or file hash has been associated with files submitted to the AMP Threat Grid cloud. 


Integrate this tools into your other security tools, and speed up your IT security triage process using the power of Cisco’s AMP Threat Grid threat intelligence.


The download link for:

AMP Threat Grid only Chrome plugin:


AMP Threat Grid and OpenDNS plugin:

Filter Blog

By date: