skip to main content
Close Icon We use cookies to improve your website experience.  To learn about our use of cookies and how you can manage your cookie settings, please see our Cookie Policy.  By continuing to use the website, you consent to our use of cookies.
Global Search Configuration


Threat Intelligence Gateways (TIGs) apply existing intelligence to automate the response to known or mundane threats and reduce the cyberthreat noise.


  • According to Metcalf’s law, connectivity drives up the "effect" of a network, which increases as a square of the number of connections. This applies to risk or threat at least as much as it does to value.

Features and Benefits

  • Describes how a TIG works.
  • Explains that TIGs are complementary to existing defensive tools.

Key questions answered

  • How does a TIG enhance the operation of a firewall?
  • What are the essential elements of a TIG?

Table of contents

Ovum view

  • Summary
  • Threat overload
  • Streamlining the challenge
  • Key aspects of a TIG


  • Further reading
  • Author

Recommended Articles


Have any questions? Speak to a Specialist

Europe, Middle East & Africa team: +44 7771 980316

Asia-Pacific team: +61 (0)3 960 16700

US team: +1 212-652-5335

Email us at

You can also contact your named/allocated Client Services Executive using their direct dial.
PR enquiries - Email us at

Contact marketing -

Already an Ovum client? Login to the Knowledge Center now