Terms of Service

Last Updated: December 1, 2025

1. Acceptance of Terms

These Terms of Service ("Terms") constitute a legally binding agreement between ThreatPulsar, Inc. ("ThreatPulsar," "we," "our," or "us") and you or the organization you represent ("Customer," "you," or "your"). By accessing or using the ThreatPulsar platform, website (threatpulsar.com), API, or any related services (collectively, the "Services"), you agree to be bound by these Terms.

If you are accessing the Services on behalf of an organization, you represent and warrant that you have the authority to bind that organization to these Terms. If you do not have such authority, or if you do not agree with any part of these Terms, you must not access or use the Services.

These Terms are effective as of the date you first access the Services or create an account, whichever occurs first. ThreatPulsar reserves the right to update these Terms at any time. Material changes will be communicated via email or in-platform notice at least 14 days before taking effect. Continued use of the Services after the effective date constitutes acceptance of the updated Terms.

2. Service Description

ThreatPulsar provides an automated threat intelligence platform that enables enterprise security operations center (SOC) teams to enrich indicators of compromise (IOCs), map observed behaviors to MITRE ATT&CK techniques, and integrate threat intelligence data into SIEM and SOAR workflows. The specific features and capabilities available to a Customer depend on the subscription plan selected.

2.1 Platform Components

The ThreatPulsar platform includes the following components, subject to subscription tier:

  • IOC Enrichment API: A REST API that accepts IOC submissions (IP addresses, domain names, file hashes, and URLs) and returns enrichment results from ThreatPulsar's integrated threat intelligence feed network.
  • MITRE ATT&CK Mapping Engine: An automated system that maps observed behavioral events to MITRE ATT&CK techniques and sub-techniques with confidence scoring.
  • Analyst Workload Dashboard: A web-based interface for monitoring SOC operational metrics including enrichment throughput, analyst queue depth, and mean time to enrich.
  • SOAR Integration Connectors: Native connectors for Splunk SOAR, Palo Alto XSOAR, and Tines that enable enrichment results to populate playbook fields automatically.
  • Threat Hunting Query Generator: A tool that generates YARA rules and Sigma detection rules from enriched IOC cluster data, with export to Splunk SPL, Elastic KQL, and Microsoft Sentinel KQL formats.

2.2 Service Availability

ThreatPulsar targets 99.9% monthly uptime for the IOC Enrichment API and associated platform components for paid subscribers. Scheduled maintenance windows will be communicated at least 48 hours in advance via the ThreatPulsar status page (status.threatpulsar.com). Downtime caused by factors outside ThreatPulsar's reasonable control — including third-party threat feed outages, upstream API unavailability, or force majeure events — is excluded from uptime calculations.

3. Account Registration and Security

To access the ThreatPulsar platform, you must create an account by providing accurate and complete registration information. You are responsible for:

  • Maintaining the confidentiality of your account credentials (username and password) and API keys
  • All activity that occurs under your account, whether or not authorized by you
  • Promptly notifying ThreatPulsar at support@threatpulsar.com if you suspect unauthorized access to your account
  • Ensuring that all users authorized to access the Services under your account comply with these Terms

ThreatPulsar will not be liable for any loss or damage arising from unauthorized access to your account resulting from your failure to maintain the confidentiality of your credentials.

ThreatPulsar reserves the right to suspend or terminate accounts that show signs of compromise, unusual activity, or violation of these Terms, pending investigation. We will notify you promptly of any account suspension and work with you to restore access after verification.

4. Subscription and Payment

4.1 Subscription Plans

ThreatPulsar offers several subscription tiers for the platform, as described on the Pricing page (threatpulsar.com/price.html). Subscription plans are offered on a monthly or annual billing cycle. Features, API rate limits, data retention periods, and support levels vary by plan. Specific plan terms are detailed at point of purchase and in the order confirmation.

4.2 Fees and Billing

All fees are quoted and charged in US Dollars (USD). Subscription fees are charged at the beginning of each billing period (monthly or annually) to the payment method on file. For annual plans, the full year's subscription fee is charged upon plan selection or renewal.

Overage charges apply when API usage exceeds the monthly IOC enrichment quota included in your subscription plan. Overage rates are disclosed on the Pricing page and in your account dashboard. Overages are billed at the end of the billing period in which they occurred.

4.3 Free Trial

ThreatPulsar may offer a free trial period for new accounts. Trial accounts are subject to reduced API rate limits and data retention periods as specified during sign-up. No payment information is required during a trial period. At the end of the trial, the account will be downgraded to a limited free tier unless you select a paid plan. ThreatPulsar reserves the right to modify or discontinue the free trial program at any time.

4.4 Cancellation and Refunds

Monthly subscribers may cancel at any time. Cancellation takes effect at the end of the current billing period; no partial refunds are provided for unused time within a billing period. Annual subscribers may cancel at any time; ThreatPulsar will provide a pro-rated refund for unused complete months remaining in the annual term, less a processing fee of 10% of the refund amount. Refund requests must be submitted within 30 days of the billing date to support@threatpulsar.com.

If ThreatPulsar materially degrades the Services or discontinues a feature that was a primary component of your subscription plan, you may request a pro-rated refund regardless of the cancellation policy described above.

4.5 Price Changes

ThreatPulsar may change subscription prices at any time. Existing subscribers will be notified of price changes at least 30 days before the next billing renewal date. Continued use of the Services after the price change takes effect constitutes acceptance of the new pricing. If you do not accept the new pricing, you may cancel your subscription before the renewal date.

4.6 Taxes

Subscription fees do not include applicable taxes. You are responsible for all taxes, duties, and levies imposed by any government authority on the Services, excluding taxes on ThreatPulsar's net income. If ThreatPulsar is required to collect and remit taxes on your behalf, the applicable tax amount will be added to your invoice.

5. Permitted Use

Subject to these Terms and your subscription plan, ThreatPulsar grants you a limited, non-exclusive, non-transferable license to access and use the Services for your internal security operations purposes. This license permits:

  • Submitting IOCs for enrichment in connection with your organization's security monitoring and incident response activities
  • Accessing enrichment results and platform data through the web interface and API
  • Integrating ThreatPulsar enrichment results into your SIEM, SOAR, and other security tooling
  • Generating YARA rules and Sigma detection rules from enrichment results for use in your organization's security detection systems
  • Allowing authorized users within your organization to access the platform under your account credentials

6. Prohibited Uses

You may not use the Services for any purpose not expressly permitted by these Terms. Specifically, you must not:

  • Share your API credentials or account access with third parties outside your organization (MSSP customers must use the multi-tenant API features rather than sharing a single account)
  • Use the Services to conduct offensive security operations, unauthorized penetration testing, or any activity targeting systems you do not own or have explicit written permission to test
  • Resell, sublicense, or redistribute enrichment data from ThreatPulsar as a standalone threat intelligence product without a written reseller agreement
  • Submit IOCs at volumes that exceed your plan's rate limits, or use automated scripts to circumvent rate limiting controls
  • Attempt to reverse engineer, decompile, or extract the underlying algorithms, data sources, or models from ThreatPulsar's enrichment system
  • Use the Services in connection with activities that violate applicable laws or regulations, including computer fraud and abuse laws
  • Interfere with or disrupt the integrity, security, or availability of the Services or their underlying infrastructure
  • Submit malicious or illegal content through the platform beyond indicator values in their standard format (IP addresses, domain names, file hashes, and URLs)

Violation of this section may result in immediate account suspension and, in cases of significant harm to ThreatPulsar or third parties, legal action.

7. Intellectual Property

7.1 ThreatPulsar Intellectual Property

All intellectual property rights in the ThreatPulsar platform, including the enrichment pipeline architecture, ATT&CK mapping algorithms, confidence scoring models, analyst dashboard, SOAR connectors, documentation, and the ThreatPulsar brand, are owned exclusively by ThreatPulsar, Inc. These Terms do not transfer any intellectual property rights to you. Your use of the Services does not grant you any right to use ThreatPulsar trademarks or branding materials without prior written consent.

7.2 Customer Data

You retain ownership of the IOC data you submit to ThreatPulsar for enrichment. By submitting data, you grant ThreatPulsar a limited, non-exclusive license to process your submitted data for the purpose of delivering enrichment results to you, improving the enrichment model's accuracy on an aggregated and anonymized basis, and fulfilling our obligations under these Terms.

ThreatPulsar does not use your tenant-specific IOC submission data to produce enrichment results for other customers. Aggregated, anonymized statistical data derived from usage patterns across all customers may be used to improve the platform without identifying any individual customer or their data.

7.3 Enrichment Results

Enrichment results delivered to you through the Services are made available for your use subject to these Terms. Enrichment results incorporate data from ThreatPulsar's threat intelligence feed network, which is licensed from third-party providers. Your use of enrichment results is subject to the usage restrictions in these Terms, including the prohibition on redistribution as a standalone product.

8. Confidentiality

Each party may disclose confidential information to the other in connection with the Services. "Confidential Information" means information designated as confidential, or that a reasonable person would understand to be confidential given the nature of the information and circumstances of disclosure. Each party agrees to: (a) protect the other party's Confidential Information with at least the same care used to protect its own confidential information (and not less than reasonable care); (b) use Confidential Information only for the purposes of these Terms; and (c) not disclose Confidential Information to third parties without the other party's written consent except as required by law or to service providers under confidentiality obligations.

9. Disclaimer of Warranties

THE SERVICES ARE PROVIDED "AS IS" AND "AS AVAILABLE" WITHOUT WARRANTY OF ANY KIND. TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, THREATPULSAR DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, NON-INFRINGEMENT, AND ACCURACY OF DATA. THREATPULSAR DOES NOT WARRANT THAT: (A) THE SERVICES WILL BE UNINTERRUPTED OR ERROR-FREE; (B) ENRICHMENT RESULTS WILL BE COMPLETE, ACCURATE, OR CURRENT; (C) ANY SECURITY THREATS DETECTED OR UNDETECTED BY THE SERVICES REPRESENT ALL THREATS PRESENT IN YOUR ENVIRONMENT; OR (D) THE SERVICES WILL MEET YOUR SPECIFIC REQUIREMENTS.

Threat intelligence data is inherently incomplete and time-limited. ThreatPulsar enrichment results represent the state of ThreatPulsar's feed network at the time of the enrichment request and should not be the sole basis for security decisions without analyst review.

10. Limitation of Liability

TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, IN NO EVENT WILL THREATPULSAR BE LIABLE FOR: (A) ANY INDIRECT, INCIDENTAL, CONSEQUENTIAL, SPECIAL, PUNITIVE, OR EXEMPLARY DAMAGES; (B) ANY LOSS OF REVENUE, PROFITS, DATA, OR BUSINESS OPPORTUNITY; OR (C) ANY DAMAGES ARISING FROM SECURITY INCIDENTS, BREACHES, OR ATTACKS NOT DETECTED BY OR DESPITE USE OF THE SERVICES.

IN ALL CASES, THREATPULSAR'S AGGREGATE LIABILITY UNDER THESE TERMS WILL NOT EXCEED THE TOTAL FEES PAID BY YOU TO THREATPULSAR IN THE 12 MONTHS PRECEDING THE CLAIM.

SOME JURISDICTIONS DO NOT ALLOW THE EXCLUSION OR LIMITATION OF CERTAIN WARRANTIES OR CONSEQUENTIAL DAMAGES. IN SUCH JURISDICTIONS, THE ABOVE LIMITATIONS APPLY ONLY TO THE EXTENT PERMITTED BY LAW.

11. Indemnification

You agree to defend, indemnify, and hold harmless ThreatPulsar, its officers, directors, employees, and agents from and against any claims, damages, liabilities, and expenses (including reasonable attorneys' fees) arising from: (a) your use of the Services in violation of these Terms; (b) your violation of applicable laws; or (c) your infringement of any third-party rights in connection with your use of the Services.

12. Governing Law and Dispute Resolution

These Terms are governed by the laws of the Commonwealth of Virginia, United States, without regard to its conflict of law provisions. You and ThreatPulsar agree to submit to the exclusive jurisdiction of the federal and state courts located in Arlington County, Virginia, for resolution of any disputes arising from these Terms or the Services.

Before initiating formal legal proceedings, both parties agree to attempt in good faith to resolve any dispute through direct negotiation for a period of 30 days after one party notifies the other in writing of the dispute. If direct negotiation fails, either party may pursue available legal remedies.

Notwithstanding the foregoing, ThreatPulsar may seek injunctive or other equitable relief in any court of competent jurisdiction to protect its intellectual property or confidential information.

13. Termination

Either party may terminate the Services upon written notice if the other party materially breaches these Terms and fails to cure the breach within 30 days of receiving written notice describing the breach.

ThreatPulsar may suspend or terminate your access to the Services immediately if: (a) you violate Section 6 (Prohibited Uses); (b) your account is used in connection with illegal activity; or (c) continued access poses a risk to ThreatPulsar's infrastructure or other customers.

Upon termination, your right to access the Services ceases immediately. ThreatPulsar will provide a 30-day data export period for paid subscribers following termination, during which you may export your IOC submission history and enrichment results. After the data export period, your data will be deleted in accordance with ThreatPulsar's data retention policy.

14. Contact Information

For questions about these Terms, contact ThreatPulsar at:

  • Email: support@threatpulsar.com
  • Phone: +1 (703) 529-6147
  • Mail: ThreatPulsar, Inc., 1201 Wilson Blvd, Arlington, VA 22209