Getting Started

Accessing the Seqrite Threat Intelligence

Seqrite Threat Intelligence is a web-based application hosted on Seqrite’s server.
To access this portal, follow these steps:

  1. Users are to plug in their USB dongle on their endpoint (Desktop or Laptop).
  2. Go to https://stip.seqrite.com/.
  3. On the Sign In page, login with the provided credentials.
  4. Once authenticated, the user will land on the Dashboard.

Setting Up Organizations and Analysts

An administrator sets up the organization’s structure, assigns user roles, and can disable the account.

  1. Setting up organization
    • Seqrite admin will create organizations within the portal.
    • Admins assign an Organization Admin for each created organization.
  2. Adding Users
    • Organization Admins can add Analysts and assign roles such as:
      • Org Admin: Full access to manage the organization.
      • Org Analyst: Can view and analyse threat intelligence data.
  3. Disabling Accounts
    • Seqrite admins can disable organizations or specific analysts.
    • Seqrite Admin or Organization Admin can disable specific users of their organization
Was this page helpful?