MITRE ATT&CK content depth
Curated ATT&CK content with OpenText threat-research analyst perspective. Programs get content plus context rather than raw framework data.
OpenText • Security operations
Core Adversary Signals delivers MITRE ATT&CK-aligned adversary intelligence, TTP correlation, and actor profiling content into SOC workflows so detection and response anchor on real adversary tradecraft rather than IOC-only patterns.
Through Merito, the MITRE ATT&CK content from Core Adversary Signals gets integrated into Core TDR and Enterprise Security Manager, mapped against existing detection coverage to surface gaps, and operationalized into hunt-program workflows so SOC investigations carry adversary context end to end rather than as shelfware.
What it is
Core Adversary Signals is the adversary-tracking intelligence product inside the OpenText SecOps line. It pulls MITRE ATT&CK-aligned content (tactics, techniques, procedures, threat-actor profiles) into SOC workflows, correlates observed activity against known adversary tradecraft, and gives SOC analysts actor and TTP context on alerts. Programs running SIEM and UEBA without adversary intelligence detect anomalies; programs adding Adversary Signals detect anomalies in the context of who is doing what.
MITRE ATT&CK alignment is the load-bearing capability. ATT&CK is the industry-standard adversary-tradecraft framework, and SOCs that map detections to ATT&CK techniques get richer triage context, gap analysis (which techniques the SOC is not catching), and threat hunting structured around adversary patterns rather than ad-hoc IOC chasing. Core Adversary Signals provides curated ATT&CK content with OpenText threat-research analyst perspective on top.
Cross-product correlation with the rest of the SecOps line is the platform claim. Adversary intelligence flows into Core Threat Detection and Response (SaaS SIEM), Enterprise Security Manager (on-prem SIEM), Network Detection and Response, Core Behavioral Signals (UEBA), and Threat Intelligence (curated IOCs). Programs running the full line get adversary-aware SOC operations; programs running Core Adversary Signals standalone get the content without the workflow integration.
What stalls Adversary Signals adoption is consuming the content without operationalizing it. Programs that subscribe to ATT&CK content, push it into the SIEM, and never use it for hunt or triage gap analysis end up paying for content that nobody references. Merito's engagement designs the operational pattern: which detections map to which techniques, what the gap analysis cadence is, how hunt programs use adversary content, and how threat-actor profiles inform IR response. Without that, the subscription is shelfware.
Ideal use cases
What it is best at
Curated ATT&CK content with OpenText threat-research analyst perspective. Programs get content plus context rather than raw framework data.
Profiles of major threat actor groups with TTP mapping, target sectors, and historical activity. SOCs anchor IR on actor patterns rather than generic IOC chasing.
Adversary intelligence flows into Core Threat Detection and Response, Enterprise Security Manager, NDR, UEBA, and Threat Intelligence inside the OpenText SecOps line.
Maps existing detections to ATT&CK techniques and surfaces gaps. Programs see which adversary tradecraft is unmonitored.
Structures threat-hunting programs around adversary content rather than ad-hoc IOC chasing.
Core capabilities
What Core Adversary Signals actually delivers as a content stream.
MITRE ATT&CK technique content
Curated ATT&CK content covering tactics, techniques, and procedures across the framework.
Threat-actor profiles
Major threat actor groups with TTP mapping, target sectors, and historical activity.
Campaign and incident analysis
Curated analysis of major campaigns and incidents for IR and detection-engineering reference.
OpenText threat-research perspective
Analyst commentary on top of raw framework content, with sector-specific context where relevant.
Turning content into operational SOC capability.
Detection-coverage mapping
Maps existing detections to ATT&CK techniques. Surfaces coverage gaps.
Hunt program enablement
Structures threat-hunting around adversary content rather than ad-hoc IOC chasing.
Investigation enrichment
Adversary context attached to SOC investigations for triage acceleration.
Adversary content flowing into the SecOps line.
SIEM integration
Adversary content feeds Core Threat Detection and Response and Enterprise Security Manager.
UEBA enrichment
Adversary context enriches Core Behavioral Signals scoring.
Threat-intel integration
Pairs with OpenText Threat Intelligence for IOC plus TTP coverage.
NDR enrichment
Network Detection and Response signals enriched with adversary context.
Where it fits in the stack
Deployment and implementation
Licensing and packaging
Core Adversary Signals
Standard SaaS edition with curated MITRE ATT&CK content and threat-actor profiles.
Best for: SOCs adding adversary intelligence to detection and response.
Core Adversary Signals with Threat Intelligence
Bundled with OpenText Threat Intelligence for IOC plus TTP coverage.
Best for: Programs consolidating adversary intelligence and threat intelligence subscriptions.
Merito services
Merito sells licenses and the delivery work around them. Pick the service that matches where you are in the lifecycle.
Content integration, detection-coverage mapping, hunt-program operationalization, IR-context wiring.
Explore service02SOC program scoping for Core Adversary Signals alongside Recorded Future, Mandiant Advantage, and specialist providers.
Explore service03Hunt program operationalization and detection-coverage gap analysis.
Explore service04Named engineer, priority SLAs, and release-time coverage for Core Adversary Signals.
Explore service05Long-term run support including content integration maintenance, hunt-program evolution, and detection-coverage updates.
Explore service06Role-based training for detection engineers, threat hunters, and IR leads.
Explore service07Merito-placed SOC engineers and OpenText specialists embedded on long-running programs.
Explore serviceOpenText Core Adversary Signals licensing
Core Adversary Signals pricing arrives with content integration, detection-coverage mapping, hunt-program operationalization, and IR-context wiring that turn adversary content into adversary-aware SOC operations rather than shelfware.
Merito point of view
Merito has audited SOCs that subscribed to ATT&CK content, dropped it into the SIEM, and never referenced it again. Adversary intelligence becomes shelfware when nobody maps existing detections to techniques, runs gap analysis on coverage, or anchors threat hunts on adversary tradecraft. Core Adversary Signals is the right product for programs willing to operationalize ATT&CK; for programs that just want a checkbox subscription, the value is muted.
Merito recommends Core Adversary Signals specifically for programs running OpenText SecOps line, when threat-hunting and detection engineering are real disciplines, and when IR response anchors on actor profiles. For programs picking specialist threat intelligence breadth, Recorded Future and Mandiant Advantage are competitive depending on the program shape. Merito surfaces those alternatives honestly during scoping.
The pairing with OpenText Threat Intelligence is the load-bearing move on adversary-aware SecOps. Threat Intelligence covers IOC depth (specific known-bad infrastructure); Core Adversary Signals covers TTP depth (how adversaries operate). Programs running both get IOC-plus-TTP coverage; programs running only one get half the picture.
What buyers usually underestimate
Related from Merito
Related solutions
Related services
Related products
Frequently Asked Questions
Consultation request
Share your SOC operating model, threat-hunting maturity, and IR program shape. A Merito OpenText specialist follows up within one business day.
MITRE ATT&CK depth
Curated ATT&CK content, threat-actor profiles, and OpenText threat-research perspective.
Operationalize
Content alone is shelfware. Merito wires it into detection coverage, hunt programs, and IR context.
Next step
A Merito Core Adversary Signals engagement starts with detection-coverage mapping and hunt-program design. Adversary content without operational integration is a checkbox subscription.