Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Threat Intelligence

9/16/2015
09:25 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

IID Launches 'Rapid Insight,' Safe Browsing Tool

Fortune 100 companies and government agencies already using Rapid Insight to gather contextual information about threats

TACOMA, Wash. – September 15, 2015 – IID, the source for clear cyberthreat intelligence, today announced the launch of a new threat indicator research tool, Rapid Insight. IID’s Rapid Insight allows threat analysts and other security professionals to simultaneously search a dozen or more sources in one place for contextual information about questionable domains, hostnames, URLs, IP addresses, email addresses and more—providing faster and more accurate responses to cyberthreats. 

“Speed is essential when investigating and combatting potential cyberthreats,” said Mike Brown, IID’s Vice President of Engineering. “When you have to manually check a dozen or more sources to get the complete picture of what a threat looks like, those minutes add up. And that added time equals extended exposure to malicious behavior, additional potential damage to your infrastructure or maybe even a lasting impact on the perception of your brand.”

“Threat analysts are typically challenged with more red flags from their systems than they can handle,” added IID CEO, Lars Harvey. “Being efficient with their investigations means they can simply address more of them than they otherwise could. Rapid Insight customers report that they save 15 to 20 minutes of every hour spent in investigations. That adds up to being able to address 50 percent more of the threats they see.”

Fortune 100 and Gov Already Using Rapid Insight

Hundreds of cyberthreat researchers from Fortune 100 companies and U.S. government agencies have already been using Rapid Insight while in beta. Those users report Rapid Insight provides them with significant productivity enhancements during threat investigations. Rapid Insight helps organizations consolidate disparate searches into a single query, so simultaneously searching a dozen threat intelligence sources takes seconds.

A threat analyst manager at a Fortune 100 technology company said, “This is the ‘Swiss Army Knife’ for quick and effective research on active threats.” A cybersecurity coordinator at a U.S. federal agency said, “Rapid Insight is our one-stop-shop for investigating malicious indicators.”

How it Works

Rapid Insight allows researchers to simply paste a suspicious threat indicator into the search field found in the Rapid Insight search section of ActiveTrust, IID’s big data solution for Internet security. These search strings may be in the form of a domain, hostname, URL, IP address, email address, MD5, SHA1 or SHA256..Rapid Insight checks that information against intelligence found in over a dozen sources, including: Alexa, DNS Lookup, IP Geolocation, Google Custom Search, Google Safe Browsing, IID ActiveTrust, Passive DNS, Reverse DNS, Reverse WHOIS via DomainTools, Virus Total and WHOIS via DomainTools. More sources are scheduled to be added in the near future.

Money Saver

Searching against premium data providers and databases can also be extremely expensive, as each requires getting a contract in place and paying costly subscription fees. Rapid Insight offers an affordable alternative, consolidating all of those services into a single usage-based fee. Because customers are only paying for the fractional access they are using, IID clients benefit even more through cost savings.

All Rapid Insight customers are pre-screened by IID before they can access data. For more information, go to internetidentity.com/rapid-insight.

About IID

IID is a cybersecurity company. Its flagship product, ActiveTrust, adds clarity to cyberthreat intelligence by distilling threat data from thousands of trusted sources, and fusing it into actionable intelligence delivered to security professionals and automated infrastructure. Fortune 500 companies and U.S. government agencies leverage IID to detect and mitigate threats, making ActiveTrust one of the world’s largest commercial cyberthreat data exchanges. For more, go to internetidentity.com.

###

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
10 Ways to Keep a Rogue RasPi From Wrecking Your Network
Curtis Franklin Jr., Senior Editor at Dark Reading,  7/10/2019
The Security of Cloud Applications
Hillel Solow, CTO and Co-founder, Protego,  7/11/2019
Where Businesses Waste Endpoint Security Budgets
Kelly Sheridan, Staff Editor, Dark Reading,  7/15/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: "Jim, stop pretending you're drowning in tickets."
Current Issue
Building and Managing an IT Security Operations Program
As cyber threats grow, many organizations are building security operations centers (SOCs) to improve their defenses. In this Tech Digest you will learn tips on how to get the most out of a SOC in your organization - and what to do if you can't afford to build one.
Flash Poll
The State of IT Operations and Cybersecurity Operations
The State of IT Operations and Cybersecurity Operations
Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-13623
PUBLISHED: 2019-07-17
In NSA Ghidra through 9.0.4, path traversal can occur in RestoreTask.java (from the package ghidra.app.plugin.core.archive) via an archive with an executable file that has an initial ../ in its filename. This allows attackers to overwrite arbitrary files in scenarios where an intermediate analysis r...
CVE-2019-13624
PUBLISHED: 2019-07-17
In ONOS 1.15.0, apps/yang/web/src/main/java/org/onosproject/yang/web/YangWebResource.java mishandles backquote characters within strings that can be used in a shell command.
CVE-2019-13625
PUBLISHED: 2019-07-17
NSA Ghidra before 9.0.1 allows XXE when a project is opened or restored, or a tool is imported, as demonstrated by a project.prp file.
CVE-2019-3571
PUBLISHED: 2019-07-16
An input validation issue affected WhatsApp Desktop versions prior to 0.3.3793 which allows malicious clients to send files to users that would be displayed with a wrong extension.
CVE-2019-6160
PUBLISHED: 2019-07-16
A vulnerability in various versions of Iomega and LenovoEMC NAS products could allow an unauthenticated user to access files on NAS shares via the API.