Share

Every investigation hits the same friction point: a suspicious IP or unfamiliar domain that needs context before you can make a call. The traditional answer is to pivot to VirusTotal, WHOIS, or Cisco Umbrella,  and by the time you’ve assembled enough to have an opinion, you’ve lost the thread.

Radiant’s Threat Intelligence Hub eliminates that pivot. Every artifact encountered during triage is automatically enriched against a curated stack of commercial threat intelligence sources, so the context is already there when you open the alert.

This guide covers Radiant’s Threat Intelligence Hub: what it is, what’s included out of the box, and how you can get the most out of it.

What is the Threat Intelligence Hub?

The Threat Intelligence Hub is Radiant’s unified enrichment layer for threat intelligence. It combines two things:

  • Radiant’s TIS (rTIS) — a curated set of built-in commercial threat intelligence sources that Radiant subscribes to, queries automatically on every alert, and makes available to every customer at no extra cost. This is the baseline of the threat intelligence hub.
  • Client TIS (cTIS) — a new capability that lets teams connect their own threat intelligence subscriptions directly into the same enrichment pipeline.

If you don’t have your own threat intelligence subscriptions

For clients that don’t have their own TI feeds, Radiant covers that for them. Radiant’s built-in feeds give every customer access to a broad stack of commercial threat intelligence sources from day one, with no configuration, no credentials to manage. Radiant feeds are available at no extra cost to all clients and are automatically used for every alert investigation.

These built-in feeds were recently expanded to include new commercial sources, including Perplexity, and now cover nine different TIS.

For teams that don’t hold their own threat intelligence subscriptions, this is your enrichment stack, fully managed, always on, and continuously expanded as Radiant adds new commercial sources.

If you have your own threat intelligence subscriptions

If your team already holds subscriptions to services like VirusTotal Premium, AbuseIPDB, or internal IOC lists, cTIS (client’s TIS) lets you connect them directly into Radiant’s enrichment pipeline so they’re queried automatically alongside the built-in stack on every triage, so you benefit both from Radiant’s and your unique intelligence layer.Radiant currently supports cTIS for:

  • VirusTotal-  File hash analysis across 70+ AV engines, URL/domain/IP reputation, malware attribution, sandbox results.
  • AbuseIPDB- Community-reported IP abuse history: scanning, brute force, spam, DDoS, exploit sources.

From that point, every triage automatically includes your feeds. No configuration needed.

If you have both

Radiant’s built-in feeds continue to enrich every alert, alongside one or more of your own cTIS layers, as premium or proprietary intelligence on top. The Hub treats both as part of the same enrichment pass: all sources are queried in parallel, and all results surface together in the artifact panel.

Even if you decide to bring your own TIS, you will continue to benefit from Radiant’s out-of-the-box feeds at no extra cost.

Understanding enrichment attribution

The attribution is clear in every investigation. When enrichment completes, every threat intelligence result appears in the artifact panel. Each card shows:
  • The provider name and whether the source is Radiant’s TIS (rTIS) or the client’s TIS (cTIS)
  • The verdict and timestamp
  • A direct link to the provider source report
Every artifact is enriched so that analysts can validate a finding or escalate with confidence, all without leaving the platform.

Getting Started

The Threat Intelligence Hub is available for all Radiant customers today. Built-in feeds are already running on every alert; nothing is required on your end.

The threat intelligence hub is available for all Radiant customers today. To connect your cTIS

  1. Go to Settings → Credentials
  2. Select your provider from the list
  3. Enter your API key and select your license tier (Public or Premium)

If you’re interested in learning more or seeing Radiant in action, speak to us.

Finally, an AI that
triages all your alerts

A short demo can save your team 1000s of wasted hours

See what your SOC could look like:

See what your SOC could look like:

Radiant Security is an unbounded AI SOC platform built to triage every alert that hits your SOC. It automates investigation across 100% of alert types and escalates only real threats to analysts, who can then respond in one click. Radiant’s integrated log management analyzes and stores all your security logs without the SIEM tax.

© Radiant Security, Inc. 2026.

Radiant Security is an unbounded AI SOC platform built to triage every alert that hits your SOC. It automates investigation across 100% of alert types and escalates only real threats to analysts, who can then respond in one click. Radiant’s integrated log management analyzes and stores all your security logs without the SIEM tax.

© Radiant Security, Inc. 2026.