03:43 PM
Dark Reading
Dark Reading
Products and Releases

IID Launches ActiveTrust Cyber Threat Sharing And Collaboration Network

Dozens of Major Enterprises and Government Agencies Quickly Adopt Platform to Control and Coordinate the Latest Cybersecurity Intelligence

TACOMA, Wash.– February 11, 2014 – IID, securing the Internet with shared cyber intelligence, today announced the general availability of ActiveTrust--the platform government agencies and enterprises are leveraging to confidently exchange threat intelligence and coordinate response between organizations. ActiveTrust accelerates big collaboration for actionable security intelligence by giving organizations a better way to get the security information they need; creating a dynamic, aligned and private community of security peers.

The ActiveTrust platform consists of three elements: a controlled intelligence exchange so participants can confidently share the latest threat information; a robust data layer for fast integration of feeds, apps, analytics and services; and a broad-based social collaboration network for coordination and insight between organizations. Dozens of Fortune 500 companies and U.S. government agencies are already benefitting from ActiveTrust's hundreds of contributing sources to power their existing security infrastructure, helping them stay ahead of--and take action against--the latest cyberthreats. This collaborative approach means enterprises and government agencies can increase the scope, quality and timeliness of their cybersecurity efforts, while freeing up valuable human resources.

"Much like cybercriminals have leveraged intelligence exchanges to carry out their attacks, ActiveTrust provides the 'good guys' with their own sharing networks to gather information vital to fending off attacks," said IID CEO Lars Harvey. "IID has spent more than ten years making connections between organizations to secure their networks, so it's only logical that we are launching a threat exchange platform that makes it faster, easier and more efficient than ever for organizations to identity and defend themselves against cyberattacks."

The ActiveTrust Platform allows:

Controlled Exchange

ActiveTrust members are prescreened and agree to a common set of rules for confidentiality and information usage--enabling everyone to exchange intelligence with confidence. The threat exchange platform includes robust data governance controls, so members can dictate what, where, when and with whom they share--even anonymously.

Efficient Intelligence Delivery

ActiveTrust takes disparate sources of data in various formats and standardizes it, offloading the work needed to translate data and making the intelligence instantly actionable. By plugging actionable data into whatever gear organizations have, every existing security investment becomes more valuable and powerful.

Broad-Based Collaboration Made Easy

Participation in ActiveTrust gives security professionals instant access to a wealth of data from an unprecedented breadth of allies and peers in the security ecosystem. As importantly, ActiveTrust members have the ability to share insights and discuss best practices through various features on ActiveTrust's social network, Hub.

Despite the growing danger posed by cybercrime, information vital to stemming the tide has been highly fragmented until ActiveTrust. Pockets of data about threat activity have been siloed within the repositories of individual enterprises, government organizations, vendor networks and research institutions. Furthermore, traditionally, threats have been shared between organizations and peers via email. But prognostications, with IID leading the way, have this approach changing.

Craig Lawson and Rob McMillan from Gartner, Inc., the world's leading information technology research and advisory company, wrote in the "Technology Overview for Machine-Readable Threat Intelligence" report; "By year-end 2016, 'threat intelligence broker' offerings will emerge, providing machine-readable threat intelligence from multiple sources to an array of technical security controls, independent of vendor."

For more details about ActiveTrust, go to and

About IID

IID is a cybersecurity company that provides the platform to easily exchange cyber threat intelligence between enterprises and governments. Top financial firms, the largest government agencies, and leading e-commerce companies, social networks and ISPs leverage IID to detect and mitigate threats. IID was founded in 1996. The company is headquartered in Tacoma, Washington. For more information about IID, go to


Andrew Goss | Program Director


o: 253.444.5446

m: 206.909.9212

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2015-05-25
Cross-site request forgery (CSRF) vulnerability in the login page in IBM License Metric Tool 9 before and Endpoint Manager for Software Use Analysis 9 before allows remote attackers to hijack the authentication of arbitrary users via vectors involving a FRAME element.

Published: 2015-05-25
IBM License Metric Tool 9 before and Endpoint Manager for Software Use Analysis 9 before do not send an X-Frame-Options HTTP header in response to requests for the login page, which allows remote attackers to conduct clickjacking attacks via vectors involving a FRAME element.

Published: 2015-05-25
The log viewer in IBM Workload Deployer 3.1 before allows remote attackers to obtain sensitive information via a direct request for the URL of a log document.

Published: 2015-05-25
Cross-site scripting (XSS) vulnerability in IBM Curam Social Program Management 6.0 SP2 before EP26, 6.0.4 before iFix10, 6.0.5 before, and before allows remote authenticated users to inject arbitrary web script or HTML via a crafted URL.

Published: 2015-05-25
Common Inventory Technology (CIT) before in IBM License Metric Tool 7.2.2, 7.5, and 9; Endpoint Manger for Software Use Analysis 9; and Tivoli Asset Discovery for Distributed 7.2.2 and 7.5 allows remote attackers to cause a denial of service (CPU consumption or application crash) via a cr...

Dark Reading Radio
Archived Dark Reading Radio
Join security and risk expert John Pironti and Dark Reading Editor-in-Chief Tim Wilson for a live online discussion of the sea-changing shift in security strategy and the many ways it is affecting IT and business.