Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Threat Intelligence

12/2/2015
10:43 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Advancements in Threat Intel Evolve to Deliver Early Warning of Cyber Attacks

BrightPoint Security Delivers Industry's First Security Command Platform with Dynamic Insight to Predict Current Threats and Threat Changes Across Digital Ecosystems

SAN MATEO, Calif. – Dec. 2, 2015 – BrightPoint Security™, a leading Threat Intelligence Platform provider for automation, curation and sharing of threat intelligence to fight cyber attacks, today introduced a new release of its Sentinel™ platform that provides immediate evidence-based predictive insight with risk-prioritized threat scoring. The new release enables enterprises to advance their threat intelligence programs and gain visibility into the cyber threats in their IT infrastructure and of their partner ecosystem.

Already the leader in threat intelligence sharing for detecting and reporting known threats across business ecosystems, today’s announcement is a natural evolution of BrightPoint’s innovative, patented Security Command Platform (SCP) technology. Now with the newest release of Sentinel, and with new add-on modules, organizations have insight into attacks that are emerging in their digital ecosystem through Sentinel Trusted Circles™ to proactively take remediation steps to protect their environments and enforce security controls.

“Organizations are understanding that protecting their business requires them to extend beyond their own virtual perimeters and across their cyber ecosystems into communities for greater threat intelligence sharing,” said Jon Oltsik, Sr. Principle Analyst at Enterprise Strategy Group. “To help organizations gain relevant threat intelligence within their digital ecosystem, they need a solution that makes it easy to support anonymous sharing and analytics to leverage these communities for faster protection in today’s world filled with cyber attacks. BrightPoint has delivered a solution that takes cyber sharing to a new level with their predictive insights.”

While current threat intelligence feeds and platforms focus on the most popular and volume-based threat tracking, BrightPoint focuses on the actual observed sightings within the virtual perimeter of an organization’s Trusted Circles. Leveraging this composite view, Sentinel delivers the industry’s first and only relevancy-focused predictive “weather-map” of threat trends within a business digital ecosystem. Organizations now have deep visibility into the possible attacks that have been crafted for a certain industry, peer group or company. Only BrightPoint delivers early warning indications of threat trends by leveraging knowledge of the velocity, timing and frequency of attacks via machine learning, and provides visibility into the robustness of campaigns through multiple attack vectors from across organizations’ unique digital ecosystem.

This latest release delivers additional integration of threat data and remediation steps. For example, BrightPoint’s new integration with Carbon Black broadens the types of internal threat intelligence that the BrightPoint platform can consume to give real-time awareness to threats within the perimeters and at the endpoints of the organization.

“Working with BrightPoint’s evidence-based solution enhances our support across customers’ ecosystems and infrastructures with predictive insights into risk-prioritized actions for remediation,” said Brian Hazzard, Bit9 + Carbon Black VP of Technical Alliances. “Adding the endpoint into the mix of threat vectors deepens organizations’ overall view of the threat landscape of their organization and those with whom they share information in their ecosystems.”

BrightPoint’s easy-to-use threat trending dashboard with the ability to drill-down into detailed data allows security personnel to view and compare their organization to others in their digital ecosystem to identify who is being targeted, and to proactively remediate to protect or enforce security controls. Additionally, the capabilities within the predictive analytics provide deeper context, resulting in the highest quality of relevant threat intelligence.

“An industry first, this predictive insight and threat trending dashboard gives organizations the solution to determine the urgency of response needed to protect themselves,” said Rich Reybok, BrightPoint CTO. “Today’s offering helps customers drive security strategy and get the most out of their security investments and resources by now having the ability to respond to the most immediate and relevant impending threats and to mitigate exposure fast.”

Availability and Pricing

The newest release of Sentinel is currently available. For more information, including pricing details, please email [email protected].

About BrightPoint Security

BrightPoint Security delivers immediate predictive insight and prescriptive response to protect businesses from cyber threats. BrightPoint enables secure community-based threat intelligence sharing to achieve the most relevant visibility and awareness of current and emerging threats across enterprises, their digital ecosystems and infrastructures. Venture backed, the company is headquartered in San Mateo, Calif. For more information, visit www.brightpointsecurity.com.

 

 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
News
US Formally Attributes SolarWinds Attack to Russian Intelligence Agency
Jai Vijayan, Contributing Writer,  4/15/2021
News
Dependency Problems Increase for Open Source Components
Robert Lemos, Contributing Writer,  4/14/2021
News
FBI Operation Remotely Removes Web Shells From Exchange Servers
Kelly Sheridan, Staff Editor, Dark Reading,  4/14/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-22893
PUBLISHED: 2021-04-23
Pulse Connect Secure 9.0R3/9.1R1 and higher is vulnerable to an authentication bypass vulnerability exposed by the Windows File Share Browser and Pulse Secure Collaboration features of Pulse Connect Secure that can allow an unauthenticated user to perform remote arbitrary code execution on the Pulse...
CVE-2021-31408
PUBLISHED: 2021-04-23
Authentication.logout() helper in com.vaadin:flow-client versions 5.0.0 prior to 6.0.0 (Vaadin 18), and 6.0.0 through 6.0.4 (Vaadin 19.0.0 through 19.0.3) uses incorrect HTTP method, which, in combination with Spring Security CSRF protection, allows local attackers to access Fusion endpoints after t...
CVE-2021-31410
PUBLISHED: 2021-04-23
Overly relaxed configuration of frontend resources server in Vaadin Designer versions 4.3.0 through 4.6.3 allows remote attackers to access project sources via crafted HTTP request.
CVE-2021-31539
PUBLISHED: 2021-04-23
Wowza Streaming Engine through 4.8.5 (in a default installation) has cleartext passwords stored in the conf/admin.password file. A regular local user is able to read usernames and passwords.
CVE-2021-31540
PUBLISHED: 2021-04-23
Wowza Streaming Engine through 4.8.5 (in a default installation) has incorrect file permissions of configuration files in the conf/ directory. A regular local user is able to read and write to all the configuration files, e.g., modify the application server configuration.