SYS-CON MEDIA Authors: Elizabeth White, Pat Romanski, Liz McMillan, Zakia Bouachraoui, William Schmarzo

News Feed Item

Recorded Future Connect Xchange: Alliance for Intelligence-Driven Security

Integrations to Expand Impact of Traditional Security Operations, Incident Response, Security Orchestration and Automation, and Vulnerability Management Solutions With External Threat Intelligence

SAN FRANCISCO, April 16, 2018 /PRNewswire/ -- RSA CONFERENCE – Recorded Future, the leading threat intelligence provider, today announced Recorded Future Connect Xchange, a global technology partner community designed with one goal in mind: help security teams by enhancing their deployed tools through rich threat intelligence from outside their organization.

Connect Xchange partners will work together to increase accessibility to threat intelligence, allowing security professionals to proactively map applicable threats to their organization, and add dynamic, real-time intelligence to traditionally static security functions. Inaugural partners include: Brinqa, Cofense (formerly known as PhishMe), DFLabs, DomainTools, EclecticIQ, Farsight Security, IBM QRadar, IBM Resilient, LogRhythm, Palo Alto Networks, ProtectWise, ReversingLabs, Tenable®, ThreatConnect, and Versive.

"Attackers are too sophisticated for security teams to only look inward when it comes to understanding the threats they face — the application of external threat intelligence is crucial. By integrating Recorded Future's intelligence with our leading incident response and SIEM solutions, we're helping to ensure our customers have all available intelligence to make the right decisions, fast. We're thrilled to help build and contribute to Recorded Future Connect Xchange and look forward to continued partnership." — Rich Telljohann, Director of Business and Corporate Development at IBM Security. 

The Future of Cybersecurity Is Intelligence Driven

Recorded Future is laser focused on providing intelligence that helps teams make faster, more confident decisions by integrating rich threat intelligence into all security processes. We're working to build the most comprehensive integration exchange in the cybersecurity market, making Recorded Future's intelligence available for (and applicable to) whatever tools our customers are using. Integration partners represent leading SIEM, incident response, ticketing, link analysis, security infrastructure, security orchestration and automation, vulnerability management, and threat intelligence platform (TIP) solutions.

"Determining a security strategy without applying the lens of threat intelligence is akin to gauging the difficulty and danger of a hike based on what you can see from the trailhead. You know it's a mountain and the plan is to get to the top, but you don't know what predators are native to the region, how challenging the trail is, and so on. Understanding what's happening outside your organization, and applying that intelligence to your existing security solutions, is the only way to stand a fighting chance against today's attackers."
— Dr. Christopher Ahlberg, CEO and Co-Founder of Recorded Future.

A sample of security integration use cases include:

Security operations: uncover unknown threats
Too often, SIEM solutions leave security professionals wading through vast amounts of data to find just one relevant alert and leave them missing critical threats. Using Recorded Future to tailor external threat intelligence and correlate with internal data, teams can pinpoint specific threats already inside — discovering unknown threats and reducing dwell time.

Incident response: immediate access to deep threat research
Lack of detailed context related to artifacts, inefficient manual research processes, and limited-scope solutions are all barriers for incident response teams. In addition to automated indicators of compromise (IOCs), full search capabilities with access to original sources enable consistent intelligence for uniform decision making and automated workflows.   

Vulnerability management: beyond static risk ratings
Security professionals are often faced with too many vulnerabilities and too little information to quickly justify and prioritize patching. Recorded Future delivers real-time, real-world exploit data and context, along with dynamic risk scores on vulnerabilities relevant to the organization's tech stack, helping to effectively prioritize patching and maximize risk reduction.  

How to Participate

Recorded Future Connect Xchange allows technology partners to more broadly apply and integrate threat intelligence, becoming a threat intelligence trusted advisor to their customers.

For information on becoming a Recorded Future Connect Xchange partner, please visit: https://www.recordedfuture.com/partners/.

About Recorded Future
Recorded Future delivers the only complete threat intelligence solution powered by patented machine learning to lower risk. We empower organizations to reveal unknown threats before they impact business, and enable teams to respond to alerts 10 times faster. To supercharge the efforts of security teams, our technology automatically collects and analyzes intelligence from technical, open web, and dark web sources and aggregates customer-proprietary data. Recorded Future delivers more context than threat feeds, updates in real time so intelligence stays relevant, and centralizes information ready for human analysis, collaboration, and integration with security technologies. 91 percent of the Fortune 100 use Recorded Future. Learn more at www.recordedfuture.com and follow us on Twitter at @RecordedFuture.

Cision View original content:http://www.prnewswire.com/news-releases/recorded-future-connect-xchange-alliance-for-intelligence-driven-security-300629959.html

SOURCE Recorded Future

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
Your job is mostly boring. Many of the IT operations tasks you perform on a day-to-day basis are repetitive and dull. Utilizing automation can improve your work life, automating away the drudgery and embracing the passion for technology that got you started in the first place. In this presentation, I'll talk about what automation is, and how to approach implementing it in the context of IT Operations. Ned will discuss keys to success in the long term and include practical real-world examples. Ge...
ClaySys Technologies is one of the leading application platform products in the ‘No-code' or ‘Metadata Driven' software business application development space. The company was founded to create a modern technology platform that addressed the core pain points related to the traditional software application development architecture. The founding team of ClaySys Technologies come from a legacy of creating and developing line of business software applications for large enterprise clients around the ...
Organize your corporate travel faster, at lower cost. Hotailors is a next-gen AI-powered travel platform. What is Hotailors? Hotailors is a platform for organising business travels that grants access to the best real-time offers from 2.000.000+ hotels and 700+ airlines in the whole world. Thanks to our solution you can plan, book & expense business trips in less than 5 minutes. Accordingly to your travel policy, budget limits and cashless for your employees. With our reporting, int...
Crosscode Panoptics Automated Enterprise Architecture Software. Application Discovery and Dependency Mapping. Automatically generate a powerful enterprise-wide map of your organization's IT assets down to the code level. Enterprise Impact Assessment. Automatically analyze the impact, to every asset in the enterprise down to the code level. Automated IT Governance Software. Create rules and alerts based on code level insights, including security issues, to automate governance. Enterpr...
The benefits of automated cloud deployments for speed, reliability and security are undeniable. The cornerstone of this approach, immutable deployment, promotes the idea of continuously rolling safe, stable images instead of trying to keep up with managing a fixed pool of virtual or physical machines. In this talk, we'll explore the immutable infrastructure pattern and how to use continuous deployment and continuous integration (CI/CD) process to build and manage server images for any platfo...
DevOpsSUMMIT at CloudEXPO, to be held June 25-26, 2019 at the Santa Clara Convention Center in Santa Clara, CA – announces that its Call for Papers is open. Born out of proven success in agile development, cloud computing, and process automation, DevOps is a macro trend you cannot afford to miss. From showcase success stories from early adopters and web-scale businesses, DevOps is expanding to organizations of all sizes, including the world's largest enterprises – and delivering real results. Am...
ICC is a computer systems integrator and server manufacturing company focused on developing products and product appliances to meet a wide range of computational needs for many industries. Their solutions provide benefits across many environments, such as datacenter deployment, HPC, workstations, storage networks and standalone server installations. ICC has been in business for over 23 years and their phenomenal range of clients include multinational corporations, universities, and small busines...
The current environment of Continuous Disruption requires companies to transform how they work and how they engineer their products. Transformations are notoriously hard to execute, yet many companies have succeeded. What can we learn from them? Can we produce a blueprint for a transformation? This presentation will cover several distinct approaches that companies take to achieve transformation. Each approach utilizes different levers and comes with its own advantages, tradeoffs, costs, risks, a...
This session describes how Professional Services organisations can deliver within Technology-as-a-Service (IaaS) constructs, in private and public enterprise cloud scenarios. See how professional services can be packaged and funded by IaaS cash flows, based upon consumption of technology services. Learn how significant, IT infrastructure transformations can be funded through OPEX spending models with multi-year As-a-Services based contracts. Understand how the automation of repeatable services c...
This sixteen (16) hour course provides an introduction to DevOps, the cultural and professional movement that stresses communication, collaboration, integration and automation in order to improve the flow of work between software developers and IT operations professionals. Improved workflows will result in an improved ability to design, develop, deploy and operate software and services faster.
Enterprises are universally struggling to understand where the new tools and methodologies of DevOps fit into their organizations, and are universally making the same mistakes. These mistakes are not unavoidable, and in fact, avoiding them gifts an organization with sustained competitive advantage, just like it did for Japanese Manufacturing Post WWII.
Most modern computer languages embed a lot of metadata in their application. We show how this goldmine of data from a runtime environment like production or staging can be used to increase profits. Adi conceptualized the Crosscode platform after spending over 25 years working for large enterprise companies like HP, Cisco, IBM, UHG and personally experiencing the challenges that prevent companies from quickly making changes to their technology, due to the complexity of their enterprise. An accomp...
Cloud computing is a goal aspired to by all organizations, yet those in regulated industries and many public sector organizations are challenged in adopting cloud technologies. The ability to use modern application development capabilities such as containers, serverless computing, platform-based services, IoT and others are potentially of great benefit for these organizations but doing so in a public cloud-consistent way is the challenge.
The digital transformation is real! To adapt, IT professionals need to transform their own skillset to become more multi-dimensional by gaining both depth and breadth of a wide variety of knowledge and competencies. Historically, while IT has been built on a foundation of specialty (or "I" shaped) silos, the DevOps principle of "shifting left" is opening up opportunities for developers, operational staff, security and others to grow their skills portfolio, advance their careers and become "T"-sh...
"Calligo is a cloud service provider with data privacy at the heart of what we do. We are a typical Infrastructure as a Service cloud provider but it's been designed around data privacy," explained Julian Box, CEO and co-founder of Calligo, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.