Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Threat Intelligence

09:25 AM
Dark Reading
Dark Reading
Products and Releases

IID Launches 'Rapid Insight,' Safe Browsing Tool

Fortune 100 companies and government agencies already using Rapid Insight to gather contextual information about threats

TACOMA, Wash. – September 15, 2015 – IID, the source for clear cyberthreat intelligence, today announced the launch of a new threat indicator research tool, Rapid Insight. IID’s Rapid Insight allows threat analysts and other security professionals to simultaneously search a dozen or more sources in one place for contextual information about questionable domains, hostnames, URLs, IP addresses, email addresses and more—providing faster and more accurate responses to cyberthreats. 

“Speed is essential when investigating and combatting potential cyberthreats,” said Mike Brown, IID’s Vice President of Engineering. “When you have to manually check a dozen or more sources to get the complete picture of what a threat looks like, those minutes add up. And that added time equals extended exposure to malicious behavior, additional potential damage to your infrastructure or maybe even a lasting impact on the perception of your brand.”

“Threat analysts are typically challenged with more red flags from their systems than they can handle,” added IID CEO, Lars Harvey. “Being efficient with their investigations means they can simply address more of them than they otherwise could. Rapid Insight customers report that they save 15 to 20 minutes of every hour spent in investigations. That adds up to being able to address 50 percent more of the threats they see.”

Fortune 100 and Gov Already Using Rapid Insight

Hundreds of cyberthreat researchers from Fortune 100 companies and U.S. government agencies have already been using Rapid Insight while in beta. Those users report Rapid Insight provides them with significant productivity enhancements during threat investigations. Rapid Insight helps organizations consolidate disparate searches into a single query, so simultaneously searching a dozen threat intelligence sources takes seconds.

A threat analyst manager at a Fortune 100 technology company said, “This is the ‘Swiss Army Knife’ for quick and effective research on active threats.” A cybersecurity coordinator at a U.S. federal agency said, “Rapid Insight is our one-stop-shop for investigating malicious indicators.”

How it Works

Rapid Insight allows researchers to simply paste a suspicious threat indicator into the search field found in the Rapid Insight search section of ActiveTrust, IID’s big data solution for Internet security. These search strings may be in the form of a domain, hostname, URL, IP address, email address, MD5, SHA1 or SHA256..Rapid Insight checks that information against intelligence found in over a dozen sources, including: Alexa, DNS Lookup, IP Geolocation, Google Custom Search, Google Safe Browsing, IID ActiveTrust, Passive DNS, Reverse DNS, Reverse WHOIS via DomainTools, Virus Total and WHOIS via DomainTools. More sources are scheduled to be added in the near future.

Money Saver

Searching against premium data providers and databases can also be extremely expensive, as each requires getting a contract in place and paying costly subscription fees. Rapid Insight offers an affordable alternative, consolidating all of those services into a single usage-based fee. Because customers are only paying for the fractional access they are using, IID clients benefit even more through cost savings.

All Rapid Insight customers are pre-screened by IID before they can access data. For more information, go to internetidentity.com/rapid-insight.

About IID

IID is a cybersecurity company. Its flagship product, ActiveTrust, adds clarity to cyberthreat intelligence by distilling threat data from thousands of trusted sources, and fusing it into actionable intelligence delivered to security professionals and automated infrastructure. Fortune 500 companies and U.S. government agencies leverage IID to detect and mitigate threats, making ActiveTrust one of the world’s largest commercial cyberthreat data exchanges. For more, go to internetidentity.com.


Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Why Cyber-Risk Is a C-Suite Issue
Marc Wilczek, Digital Strategist & CIO Advisor,  11/12/2019
Black Hat Q&A: Hacking a '90s Sports Car
Black Hat Staff, ,  11/7/2019
The Cold Truth about Cyber Insurance
Chris Kennedy, CISO & VP Customer Success, AttackIQ,  11/7/2019
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2019-11-14
Pomelo v2.2.5 allows external control of critical state data. A malicious user input can corrupt arbitrary methods and attributes in template/game-server/app/servers/connector/handler/entryHandler.js because certain internal attributes can be overwritten via a conflicting name. Hence, a malicious at...
PUBLISHED: 2019-11-14
Unprotected Transport of Credentials in ePO extension in McAfee Data Loss Prevention 11.x prior to 11.4.0 allows remote attackers with access to the network to collect login details to the LDAP server via the ePO extension not using a secure connection when testing LDAP connectivity.
PUBLISHED: 2019-11-14
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in McAfee Advanced Threat Defense (ATD) prior to 4.8 allows remote authenticated attacker to execute database commands via carefully constructed time based payloads.
PUBLISHED: 2019-11-14
Path Traversal: '/absolute/pathname/here' vulnerability in McAfee Advanced Threat Defense (ATD) prior to 4.8 allows remote authenticated attacker to gain unintended access to files on the system via carefully constructed HTTP requests.
PUBLISHED: 2019-11-14
Unprotected Storage of Credentials vulnerability in McAfee Advanced Threat Defense (ATD) prior to 4.8 allows local attacker to gain access to the root password via accessing sensitive files on the system.