Multi-Tenant Threat Isolation: See Only What Matters to You
When you subscribe to a threat intelligence feed with thousands of active indicators, most of them aren't relevant to your organization. A brute-force attack on a server in Singapore doesn't matter if you only operate in North America. A blacklisted /24 in Eastern Europe is noise if none of your customers route through it.
SATIS now solves this with multi-tenant threat isolation — register your network prefixes, and we show you only the threats that target your infrastructure.
How It Works
1. Register Your Networks
Through the portal's Networks tab or the API, register the IP prefixes your organization owns or operates:
curl -X POST https://setecastronomyinc.com/api/v1/customer/networks \
-H "Authorization: Bearer tck_your_key" \
-H "Content-Type: application/json" \
-d '{"prefix": "203.0.113.0/24", "label": "Production subnet"}'
You can register up to 20 prefixes — individual IPs, /24s, /16s, or IPv6 blocks.
2. Get Scoped Threats
Query the customer threats endpoint to see only what targets your networks:
curl https://setecastronomyinc.com/api/v1/customer/threats \
-H "Authorization: Bearer tck_your_key"
The matching engine performs bidirectional subnet comparison:
- A registered
/24matches threats targeting any/32within it - A registered
/32is matched by threats targeting a containing/24 - Both IPv4 and IPv6 are supported
This means if you register 203.0.113.0/24 and a threat targets 203.0.113.45, you'll see it. And if a threat targets the broader 203.0.113.0/22, you'll see that too — because it overlaps with your registered prefix.
3. Filter by Severity
Add severity filtering to focus on what matters most:
curl "https://setecastronomyinc.com/api/v1/customer/threats?severity=critical" \
-H "Authorization: Bearer tck_your_key"
The Portal Experience
The new Networks and Threats tabs in the customer portal provide a visual interface:
- Networks tab: Add, label, and remove your network prefixes with a simple form
- Threats tab: Browse threats targeting your networks in a sortable table with severity color coding, source attribution, and confidence scores
Why This Matters
For managed security providers running multiple customer networks, this is transformative. Each customer sees only their threats. A SOC analyst monitoring 50 networks can instantly filter to the one that's under attack.
For enterprises, it eliminates the "drinking from a firehose" problem. Instead of parsing 5,000 daily threat indicators to find the 12 that affect you, SATIS does the filtering on the server side.
Combined with our webhook notifications, you can get real-time alerts only for threats targeting your specific infrastructure — no noise, no fatigue, just actionable intelligence.
Back to Blog