Cybersecurity

How to Enhance Threat Prioritization with Securonix ThreatQ and AI SPERA Criminal IP Integration

2026-05-03 05:46:00

Introduction

In today's cybersecurity landscape, security teams are overwhelmed with alerts, many of which lack sufficient context to prioritize effectively. The recent partnership between Securonix and AI SPERA addresses this challenge by integrating Criminal IP threat intelligence directly into the Securonix ThreatQ Platform. This guide provides a step-by-step approach to setting up and leveraging this integration to enrich your threat intelligence with real-time IP context, enabling faster, more accurate incident response. By the end, you'll be able to transform raw IP data into actionable insights that reduce false positives and focus your team on the most critical threats.

How to Enhance Threat Prioritization with Securonix ThreatQ and AI SPERA Criminal IP Integration
Source: siliconangle.com

What You Need

Before you begin, ensure you have the following materials and prerequisites:

Step-by-Step Integration Guide

Step 1: Access ThreatQ Integration Settings

Log in to your Securonix ThreatQ console as an administrator. Navigate to the Administration menu and select Integration Settings (or Data Sources, depending on your version). This is where you'll manage all third-party connectors. Look for the option to add a new integration – typically labeled “Add Integration” or “+ New Data Source.”

Step 2: Configure the Criminal IP Data Source

In the integration catalog, locate AI SPERA Criminal IP. If it does not appear, verify your ThreatQ version supports custom integrations, or contact Securonix support. Click on it and provide the following details:

Click Test Connection to validate the credentials. A success message confirms the integration is ready.

Step 3: Map Fields and Enable Enrichment

After saving the data source, you need to map fields so ThreatQ can automatically enrich incoming IP indicators. Go to Enrichment Rules under the integration settings. Create a new rule:

  1. Trigger Condition – Choose “When an IP indicator is added or updated.”
  2. Action – Select “Query Criminal IP” and specify the enrichment type (e.g., reputation, abuse score, geolocation).
  3. Field Mapping – Map ThreatQ's IP Address field to the Criminal IP API's ip parameter. Then map returned fields like abuse_confidence_score, country, isp into corresponding ThreatQ fields.
  4. Priority – Set a priority for enriched data (e.g., “High”) to ensure it appears prominently in alerts.

Save the rule. Now every new or updated IP in ThreatQ will automatically trigger a lookup against Criminal IP.

Step 4: Build Playbooks for Automated Response

To maximize value, use ThreatQ's orchestration capabilities to create playbooks that act on enriched intelligence. Go to Playbooks and choose Create New Playbook. Example workflow:

Save and activate the playbook. This automation reduces manual investigation time.

How to Enhance Threat Prioritization with Securonix ThreatQ and AI SPERA Criminal IP Integration
Source: siliconangle.com

Step 5: Analyze and Prioritize Indicators

With integration running, open the Indicators tab. You'll see IP addresses now display enriched data from Criminal IP, such as:

Use the Prioritization View to sort IPs by score. This allows you to focus on the most dangerous threats first. For example, an IP with a score of 95 and recent activity should be investigated immediately, while a score of 10 with no history can be deprioritized.

Step 6: Monitor and Refine Integration Performance

Regularly review the integration's health under Logs & Monitoring. Look for errors such as API timeouts or quota limits (Criminal IP may impose daily request caps). Adjust the polling interval if needed. Also, periodically refine your enrichment rules – for instance, add extra fields like threat type or associated malware as new API features become available. Share feedback with your team to fine-tune playbooks for evolving threats.

Tips for Success

By following this guide, your security operations center will gain deeper context for IP indicators, reduce false positives, and accelerate incident response. The Securonix–AI SPERA partnership transforms raw data into a powerful decision-making tool. Start implementing today and experience the impact of enriched threat intelligence.

Explore

Russia’s Soyuz 5 Rocket Achieves Successful Maiden Flight Tesla's Optimus Robot: The Billion-Dollar Question of Who Will Buy 1 Million Units a Year Professional Athletes Unions Urge CFTC to Ban 'Under' Bets on Player Performance Python 3.15.0 Alpha 4: A Sneak Peek at the Future of Python Rivian Revenue Surges as R2 Production Accelerates in Q1 2026