Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Analytics //

Security Monitoring

08:55 AM
Dark Reading
Dark Reading
Products and Releases

BrightPoint Security Broadens availability of Threat Intel platform across ISAC/ISAO Orgs

All ISACs/ISAOs can Benefit from Proven Solution Leveraged by NH-ISAC to Offer Threat Intelligence Sharing to Members for Free

LAS VEGAS (Black Hat USA 2015, Innovation City Booth No. 16) – Aug. 5, 2015 -- BrightPoint Security™, a leading Threat Intelligence Platform (TIP) provider for automation, curation and sharing of threat intelligence to fight cyber threats, today announced it is offering its Sentinel Lite TIP to all ISAC/ISAO organizations at no cost, further facilitating the sharing of threat intelligence to combat attacks and cyber criminals.

BrightPoint is demonstrating its solution at Black Hat USA 2015 at Mandalay Bay in Las Vegas this week, in its Booth Number 16 in Innovation City on the expo floor.

Now, ISAC/ISAO organizations across industries can leverage the industry’s fastest threat detection solution based on a patented sharing model already in use today by the National Health ISAC (NH-ISAC), which offers threat intelligence sharing as a free benefit of membership. BrightPoint is the first and only patented threat intelligence solution designed for secure sharing that addresses privacy and liability concerns.

“The NH-ISAC has demonstrated that sharing of threat intelligence is a needed component for industry best practices in order to protect private data,” said Jim Routh, Chairman of the Board at the NH-ISAC. “Any solution that facilitates sharing of specific cyber threat information without attribution represents significant benefits within and across industries.”

BrightPoint uniquely delivers safe, secure, non-attributed sharing of threat intelligence. The company recently received patents around bi-directional sharing of Indicators of Compromise (IOC), further increasing its advantage over competing products. Sentinel is the industry’s only patented solution that supports sharing without attribution, in addition to supporting other use cases such as supply chain, subsidiaries and affiliate business models where attribution is needed.

“This offer announced today supports our goal of engaging all organizations and enabling them to share threat intelligence with other industry organizations at no additional cost,” said Anne Bonaparte, President and CEO of BrightPoint. “We are passionate about optimizing the use of scarce security resources by leveraging tools to automate previously manual processes and reduce time to identify threats and remediate them. BrightPoint’s growing traction proves that a solution that builds on industry standards and protects privacy of organizations will be the solution of choice to help facilitate sharing, as long as privacy and liability concerns are addressed.”

With Sentinel Lite, NH-ISAC members benefit from real-time visibility of threats within their IT infrastructure, and from behind the perimeter of their peers by leveraging the industry’s only solution delivering threat intelligence sharing with granular policy controls. BrightPoint Sentinel is easy to deploy in less than an hour, and customers have found attacks active in their environments that they thought were protected.

Following the Executive Order Promoting Private Sector Cybersecurity Information Sharing signed in February, the NH-ISAC is leading the industry by incorporating BrightPoint’s TIP to share threat intelligence and addresses privacy and liability concerns for free for member organizations. BrightPoint uniquely enables company data to be kept anonymous and without attribution, and reports only indicators of compromise, frequency and timing of detections. It supports industry standards including STIX/TAXII, Open IOC and CyBox.

About Black Hat

For more than 17 years, Black Hat has provided attendees with the very latest in information security research, development, and trends. These high-profile global events and trainings are driven by the needs of the security community, striving to bring together the best minds in the industry. Black Hat inspires professionals at all career levels, encouraging growth and collaboration among academia, world-class researchers, and leaders in the public and private sectors. Black Hat Briefings and Trainings are held annually in the United States, Europe and Asia, and are produced by UBM Tech. More information is available at: http://www.blackhat.com.

About BrightPoint Security
Formerly Vorstack, BrightPoint Security provides a Threat Intelligence Platform that automates the process of collecting, analyzing, correlating and securely sharing structured and unstructured machine-readable information on current and emerging cyber threats. The BrightPoint Sentinel Platform dramatically increases operational efficiency by reducing the time it takes enterprises to identify and remediate security threats. BrightPoint enables secure and anonymous sharing and ensures control and protection of threat data. BrightPoint reduces discovery time, remediation time, and overall risk to cyber-threats. For more information, visit www.brightpointsecurity.com.


Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Attackers Leave Stolen Credentials Searchable on Google
Kelly Sheridan, Staff Editor, Dark Reading,  1/21/2021
How to Better Secure Your Microsoft 365 Environment
Kelly Sheridan, Staff Editor, Dark Reading,  1/25/2021
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: I can't find the back door.
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today's Enterprises
COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-01-25
The MediaWiki "Report" extension has a Cross-Site Request Forgery (CSRF) vulnerability. Before fixed version, there was no protection against CSRF checks on Special:Report, so requests to report a revision could be forged. The problem has been fixed in commit f828dc6 by making use of Medi...
PUBLISHED: 2021-01-25
ORAS is open source software which enables a way to push OCI Artifacts to OCI Conformant registries. ORAS is both a CLI for initial testing and a Go Module. In ORAS from version 0.4.0 and before version 0.9.0, there is a "zip-slip" vulnerability. The directory support feature allows the ...
PUBLISHED: 2021-01-25
An XML external entity (XXE) injection vulnerability was discovered in the Nutch DmozParser and is known to affect Nutch versions < 1.18. XML external entity injection (also known as XXE) is a web security vulnerability that allows an attacker to interfere with an application's processing of XML ...
PUBLISHED: 2021-01-25
When handler-router component is enabled in servicecomb-java-chassis, authenticated user may inject some data and cause arbitrary code execution. The problem happens in versions between 2.0.0 ~ 2.1.3 and fixed in Apache ServiceComb-Java-Chassis 2.1.5
PUBLISHED: 2021-01-22
Pepperl+Fuchs Comtrol IO-Link Master in Version 1.5.48 and below is prone to an authenticated reflected POST Cross-Site Scripting