Blog

Insights for Intelligence Analysts: Exploring the Future of Data Analysis

Join Our Community

Join the Synapse Slack community and connect with other analysts to discuss best practices and share success stories.

Read More >
...

Researching the Chrome Extension Compromise Activity using Synapse

A discussion of our research and findings that differed from public reporting and the methodology and analytic choices behind them.

Read More >
...

From Code Families to Software Ecosystems: Documenting Relationships Between Tools and Other Resources

Learn about how The Vertex Project creates software ecosystems to capture additional context about software.

Read More >
...

Categorizing Software with Code Families

Our code family methodology provides a granular way to identify and track software based on shared source code.

Read More >
...

More Than Malware Families: Retooling Our Approach to Tracking Software

Introducing The Vertex Project’s methodology for analyzing software beyond traditional malware family classifications.

Read More >
...

Wi-Fi Network Analysis Using the WiGLE Power-Up

Three wireless access point research use cases showcase how to use the WiGLE Power-Up to discover, analyze, and track wireless networks of interest.

Read More >
...

Guide to Synapse and Storm Resources

Resources for getting started, customizing your Workspace in Synapse Enterprise, and the Storm Query Language.

Read More >
...

Merging Threat Clusters (Threat Clusters Part 2)

In this follow-on piece, we discuss when and how to combine overlapping clusters of threat activity.

Read More >
...

Getting Set up with Synapse Power-Ups

Learn how to install, configure, and use Synapse Power-Ups to “supercharge” your analysis through using additional features and functionalities.

Read More >
...

Getting Started with a Synapse Demo Instance

Resources to help you familiarize yourself with Synapse, navigate the UI, and perform basic analysis within your Synapse demo instance.

Read More >
...

Investigating an Unfamiliar File with Synapse

A walk-through of how to add an indicator, query data sources for additional information, pivot to related indicators, and tag findings.

Read More >
...

What is a Threat Cluster? (Threat Clusters Part 1)

An introduction to the concept of threat clustering to enhance insight into and tracking of activity.

Read More >
...

Vertex Intel Sharing Community - FAQ

Introducing the Vertex Intel Sharing Community, where analysts can collaborate and share insights.

Read More >
...

Using Spotlight Extractors for Arbitrary Data

Learn how to use extractors to ingest and handle diverse data formats when working in the Spotlight Tool.

Read More >
...

Vertex Intel Sharing: Sinkhole Infrastructure Research

A collaborative research project within the Vertex Intel Sharing Community identifies sinkhole infrastructure.

Read More >
...

Capturing Structured Data in Spotlight with the Table Extractor

Use the Spotlight Tool's table extractor feature to import structured data from blogs and reports.

Read More >
...

Using the Synapse-Mitre-Attack Power-Up to Ask Questions of the MITRE ATT&CK Framework

Integrate the MITRE ATT&CK framework into Synapse Enterprise to query and map attack techniques.

Read More >
...

From Group to Individual: Modeling InformNapalm’s Article on Sergey Morgachev of APT28

Learn how to represent and analyze data about both groups and individuals within Synapse Enterprise.

Read More >
...

Tips and Tricks: Storm and the Synapse UI

Tips for using the Storm query language and navigating the Synapse Enterprise user interface.

Read More >
...

Best Practices for Views and Layers

Leverage the Views and Layers architecture to manage data visibility and facilitate collaboration across analysts and teams.

Read More >
...

Using Synapse to Investigate Suspected Credential Theft Activity

Read about how we used Synapse Enterprise to research and analyze probable credential theft activity.

Read More >
...

Using the Vertex-Threat-Intel Power-Up Workflow

Streamline threat intelligence workflows with the Vertex Threat Intel Power-Up.

Read More >
...

Leveraging DNS Suffix Data for Threat Clustering

Learn how to analyze DNS patterns to identify connections between malicious entities.

Read More >
...

Analyzing Two of Russia's Military Intelligence Units with Synapse

Model and analyze complex organizational structures.

Read More >
...

Analyzing a Suspected Russian Influence Operation with Synapse

Track and analyze information campaigns and their dissemination with Synapse Enterprise.

Read More >
...

Using the Synapse-Twitter Power-Up to Ingest IOCs Shared via Twitter

Learn how to use the Synapse-Twitter Power-Up to monitor and collect data from social media.

Read More >
...

Automating Power-Ups to Aid Data Ingest, Enrichment, and Analysis

Automated workflows incorporate Synapse Power-Ups to streamline data ingestion and enrichment, as well as analysis processes.

Read More >
...

Vertex Tag Tree Overview

We discuss our approach to tag trees and share a starting set for teams to import and build off of.

Read More >
...

Supercharge Your Analysis with Synapse Power-Ups

We introduce Synapse Power-Ups and showcase how to use them for different analytical scenarios.

Read More >
...

Preserving Analysts’ Sanity by Automating Sinkhole Monitoring

Leverage Synapse Enterprise’s support for automation to reduce analysts’ manual workload.

Read More >
...

Importing Data Doesn’t have to be hard: Transferring Structured Data at Scale with Csvtool

Learn how to import structured data at scale into a demo instance of Synapse Enterprise with the Csvtool.

Read More >

Learn More

Discover how these powerful features can transform your analytical capabilities.

Synapse Bootcamp

Learn more about our online instructor-led and self-paced training options.

Learn More >

Explore Use-Cases

Visit our YouTube channel to see how analytical teams use Synapse Enterprise.

Learn More >

Contact Sales

Tell us about your specific needs and use cases.

Learn More >