Enterprise IT Context for the CTO

Bob Gourley

Subscribe to Bob Gourley: eMailAlertsEmail Alerts
Get Bob Gourley via: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn

Blog Feed Post

iDefense IntelGraph: A next-generation threat intelligence platform to provide context around threats

Verisign’s iDefense Security Intelligence Services is widely known in the enterprise technology community for providing actionable intelligence on cyber threats. By actionable we mean information that can be acted on either by security and IT teams or in automated ways, but actionable is the key word here. iDefense provides information that is used to prioritize actions and stop adversaries from accomplishing their objectives. They inform the decision-making of your security and IT teams. As part of Verisign, iDefense is also part of the team that has helped keep the .COM, .NET, .EDU and .GOV DNS infrastructure secure and 100 percent available.

Verisign has recently announced the availability of their next-generation threat intelligence platform, iDefense IntelGraph.


iDefense IntelGraph is built on graph database technologies to allow all facets of threat intelligence to be stored in a central repository interconnected by links that provide rich context to all the content. Now information from the most comprehensive database of threat intelligence (technical and human intelligence on actors, malware, exploits, targets, vulnerabilities, etc.) can be contextually navigated and new information can be rapidly assessed in defense of your organization.

For a quick introduction to the power of IntelGraph see the use case video at this link and embedded below:

More from Vice President, Verisign iDefense Security Intelligence Services Josh Ray:

With significant data breaches making headlines over the last six months, most notably the U.S. Government’s Office of Personnel Management (OPM), organizations managing critical networks and data are watching their worst nightmares play out on a public stage. As these organizations hustle to shore up their defenses in the wake of new breaches, security intelligence is playing a large role in helping key decision makers cut through the glut of security information, and understand which threats are relevant. But how do analysts determine the relevance of a threat?

In short, context. By analyzing the relationships between otherwise disparate incidents, actors, vulnerabilities, exploits, malware families and other threat elements, analysts can see threats from multiple angles, which can help them identify flaws in their own infrastructure, anticipate new vectors and better understand their adversaries. The problem is that many providers have traditionally delivered their intelligence in static reports and database entries, leaving the hard work of creating context to someone else -- until now.

For more information see Verisign.com/iDefense or download the iDefense 2015 Threats and Trends report



Read the original blog entry...

More Stories By Bob Gourley

Bob Gourley writes on enterprise IT. He is a founder of Crucial Point and publisher of CTOvision.com