• Skip to primary navigation
  • Skip to main content
  • Skip to footer

Cisco Umbrella

Enterprise network security

  • Contact Sales
  • Login
    • Umbrella Login
    • Cloudlock Login
  • Search
Search
  • Why Us
    • Why Cisco Umbrella
      • Why Try Umbrella
      • Why DNS Security
      • Why Umbrella SASE
      • Our Customers
      • Customer Stories
      • Why Cisco Security
    • Fast Reliable Cloud
      • Global Cloud Architecture
      • Cloud Network Status
      • Global Cloud Network Activity
    • Unmatched Intelligence
      • A New Approach to Cybersecurity
      • Interactive Intelligence
      • Cyber Attack Prevention
      • Umbrella and Cisco Talos Threat Intelligence
    • Extensive Integrations
      • IT Security Integrations
      • Hardware Integrations
      • Meraki Integration
      • Cisco Security for Chromebook
  • Products
    • Cisco Umbrella Products
      • Cisco Umbrella Cloud Security Service
      • Recursive DNS Services
      • Cisco Umbrella SIG
      • Umbrella Investigate
      • What’s New
    • Product Packages
      • Cisco Umbrella and Cisco Secure Access Packages
      • – DNS Security Essentials Package
      • – DNS Security Advantage Package
      • – SIG Essentials Package
      • – SIG Advantage Package
      • Umbrella Support Packages
      • Cisco Umbrella for Government Packages
    • Functionality
      • DNS-Layer Security
      • Secure Web Gateway
      • Cloud Access Security Broker (CASB)
      • Cloud Data Loss Prevention (DLP)
      • Cloud-Delivered Firewall
      • Cloud Malware Protection
      • Remote Browser Isolation (RBI)
    • Man on a laptop with headphones on. He is attending a Cisco Umbrella Live Demo
  • Solutions
    • SASE & SSE Solutions
      • Your SSE journey with Cisco
      • Cisco Umbrella SASE
      • Secure Access Service Edge (SASE)
      • What is SASE
    • Functionality Solutions
      • Web Content Filtering
      • Secure Direct Internet Access
      • Shadow IT Discovery & App Blocking
      • Fast Incident Response
      • Unified Threat Management
      • Protect Mobile Users
      • Securing Remote and Roaming Users
      • Umbrella and Duo Layered Protection
    • Network Solutions
      • Guest Wi-Fi Security
      • SD-WAN Security
      • Off-Network Endpoint Security
    • Industry Solutions
      • Government and Public Sector Cybersecurity
      • Financial Services Security
        • – FTC Safeguards Rule Compliance 2023
      • Cybersecurity for Manufacturing
      • Higher Education Security
      • K-12 Schools Security
      • Healthcare, Retail and Hospitality Security
      • Enterprise Cloud Security
      • Small Business Cybersecurity
  • Resources
    • Content Library
      • Top Resources
      • Research Reports
      • Case Studies
      • Videos
      • Datasheets
      • eBooks
      • Solution Briefs
      • Cybersecurity Webinars
    • International Documents
      • Deutsch/German
      • Español/Spanish
      • Français/French
      • Italiano/Italian
      • 日本語/Japanese
    • Security Definitions
      • What is DNS Security
      • What is a Secure Web Gateway
      • What is a Cloud Access Security Broker (CASB)
      • What is Security Service Edge (SSE)
      • What is Secure Access Service Edge (SASE)
      • Cyber Threat Categories and Definitions
    • For Customers
      • Support
      • Customer Success Webinars
      • Free Trial Quick Start Guide
      • Free Trial Help and Tips
  • Trends & Threats
    • Market Trends
      • Generative AI Cybersecurity Risks and Rewards
      • Hybrid Workforce
      • Rise of Remote Workers
      • Secure Internet Gateway (SIG)
    • Security Threats
      • How to Stop Phishing Attacks
      • Malware Detection and Protection
      • Ransomware is on the Rise
      • Cryptomining Malware Protection
      • Cybersecurity Threat Landscape
      • Global Cyber Threat Intelligence
    •  
    • Woman connecting confidently to any device anywhere
  • Partners
    • Channel Partners
      • Partner Program
      • Become a Partner
    • Service Providers
      • Secure Connectivity
      • Managed Security for MSSPs
      • Managed IT for MSPs
    •  
    • Person looking down at laptop. They are connecting and working securely
  • Blog
    • News & Product Posts
      • Latest Posts
      • Products & Services
      • Customer Focus
      • Feature Spotlight
    • Cybersecurity Posts
      • Security
      • Threats
      • Cybersecurity Threat Spotlight
      • Research
    •  
    • Register for a webinar - with illustration of connecting securely to the cloud
  • Contact Us
  • Umbrella Login
  • Cloudlock Login
  • Free Trial
Clearing search keywords
Products & Services

Now available: Hive-Cortex Analyzer and Maltego Transform for Investigate

Author avatar of Jennifer LiouJennifer Liou
Updated — February 28, 2024 • 3 minute read
View blog >

Powered by the new Cisco Umbrella Investigate On-Demand Enrichment API

We are pleased to announce three updates for Investigate users. For security teams using The Hive-Cortex for threat intelligence, a new analyzer for Investigate is now available in Cortex. In addition, for security teams using Maltego, there is a new transform option now available. The new transform for Cisco Umbrella Investigate joins the Cisco Threat Grid transform. Powering these integrations is a new package, the Cisco Umbrella Investigate On-Demand Enrichment API.

Cisco Umbrella Investigate On-Demand Enrichment API

This new entry-level Cisco Umbrella Investigate API package makes it easy for organizations to integrate Investigate threat intelligence with their SIEM, TIP and other security orchestration tools such as Cortex and Maltego. The API allows analysts to access Investigate’s intelligence on-demand and includes a quota of up to 2000 requests a day.

TheHive-Cortex Analyzer –  Investigate

We are committed to advancing security-related open source technology initiatives and we are excited to offer integration with TheHive, a popular and powerful open source threat intelligence sharing platform (MISP compliant). Cortex is The Hive’s observable analysis engine, which over the past few years has increased the number of its analyzers to over 100.

Why use the Investigate analyzer?

The Investigate analyzer helps TheHive-Cortex users easily create, enrich, and share observables.

Create and enrich domain observable

Create new observable(s) window
(1) Add a new ‘domain’ observable in The Hive
Navigating to observable(s) tab
(2) Navigate to the observable’s tab
Running Investigate analyzer
(3) Run the Investigate analyzer
Report with categorized results
(4) Categorization results are presented in the report
Taggging observables
(5) Observables are tagged accordingly

Create and enrich hash observable

Create new observable(s) window
(1) Add a new hash observable in The Hive
Running Investigate analyzer
(2) Run the Investigate analyzer to retrieve ThreatGrid data associated with the hash
Sample ThreatScore in report
(3) Sample results are presented in the report
Tagging observables
(4) Observables are tagged accordingly
Raw report JSON
(5) More data is available in the raw report

Maltego Transform for Investigate

For years security teams have relied on Maltego for graphing of various types of entities, such as domains, IPs, and registrants. With the new Investigate transform, security practitioners can have more meaningful and complete visualizations of how various threat intelligence components are connected.

Why use the Investigate Transform for Maltego?

The Investigate transform helps Maltego users discover hidden but useful details that security teams want when exploring domains, IPs, and other threat intelligence entities. In addition to enabling pivoting between known and new connections between domains and IPs on the same infrastructure, the Investigate transform shows relationships between domains that do not share the same hosting infrastructure.

Typically, calls by malicious entities such as malware on a compromised, or other attacker controller machines, to a malicious domain are quickly preceded or followed by calls to other such domains. This relationship is difficult to expose, but Investigate has rich intelligence at a global level via the Cisco Umbrella resolvers to capture these co-occurring requests. Co-occurrences provides incident responders and threat hunters alike a new way of identifying and preventing potential attacks by identifying domains looked up in rapid succession of a given domain.

Running Transform(s) in domains
(1) Start with a domain of interest in Maltego. Right-click to access the Investigate transform. Select domain-to-cooccurrences
Domains that co-occur with original domain
(2) See all the domains that co-occur with the original domain, i.e. DNS queries for the original domain and these domains taking place globally at the same time

Summary

Cisco Umbrella Investigate threat intelligence data is now more accessible than ever with the integrations of TheHive and Maltego. Coupled with the new Cisco Umbrella Investigate On-Demand Enrichment API, more organizations can establish and conduct faster, effective incident response and threat hunting operations.

Getting Started

TheHive and Cortex are free to use (GNU 3.0).
Maltego Community Edition free to use. Maltego Classic is $999.
Users will need an Investigate API key to use the Investigate Cortex Analyzer or the Investigate Maltego transform (Request a trial of Cisco Umbrella with Investigate).
Are you working on a security research project? Please reach out to the Cisco Umbrella Investigate team to see how Investigate can advance your research project.

Related Resources

  • https://blog.thehive-project.org/
  • https://github.com/TheHive-Project/TheHive
  • https://github.com/TheHive-Project/Cortex
  • https://en.wikipedia.org/wiki/Maltego
  • Maltego Transform for Cisco Umbrella Investigate: https://github.com/opendns/opendns_transform

Suggested Blogs

  • Cisco Umbrella for Government: DNS Security Integrated With CISA Protective DNS August 29, 2024 4 minute read
  • Cisco Umbrella: A Leader in the GigaOm Radar for DNS Security June 26, 2024 3 minute read
  • Go Big & Go Chrome: Strengthen Cybersecurity in Education, the Enterprise & Beyond March 28, 2024 5 minute read

Share this blog

FacebookTweetLinkedIn
Subscribe to the Cisco Umbrella blog Subscribe

Follow Us

Facebook X LinkedIn Youtube

Footer Sections

What we make

  • Cloud Security Service
  • DNS-Layer Network Security
  • Secure Web Gateway
  • Security Packages

Who we are

  • Global Cloud Architecture
  • Cloud Network Status
  • Cloud Network Activity
  • OpenDNS is now Umbrella
  • Cisco Umbrella Blog

Learn more

  • Webinars
  • Careers
  • Support
  • Cisco Umbrella Live Demo
  • Contact Sales
Umbrella by Cisco
208.67.222.222+208.67.220.220
2620:119:35::35+2620:119:53::53
Sign up for a Free Trial
  • Cisco Online Privacy Statement
  • Terms of Service
  • Sitemap

© 2025 Cisco Umbrella