Collection
Threat data goes beyond lists of malicious IP addresses, file hashes, and domains. Your customers' personally identifiable and sensitive information also poses a threat if leaked as they are critical to identifying, tracking, or impersonating a particular person.
Analysis
Threat intelligence is any knowledge that is derived from objective evidence – such as data – and is used to collect, process, and analyze an attacker’s motives. It can take several forms, depending on the primary objectives and initial target audience, but it should be easy to use even for a non-technical user.