SlideShare a Scribd company logo
1 of 2
Download to read offline
Actionable Cyber Threat Intelligence
ThreatScape®
Arm Your Team with Relevant, Actionable Intelligence
ThreatScape® cyber threat intelligence equips enterprises with strategic,
operational and tactical analysis derived by our global team of experts.
ThreatScape subscriptions provide the intelligence necessary to align your
security program with business risk management goals and to proactively
defend against new and emerging cyber threats. With intelligence coverage
across the threat landscape, along with rich contextual reporting that includes
the motivation and intent of adversaries, their campaigns and technical
indicators, the malware used, and the vulnerabilities being exploited,
ThreatScape arms your team with the Actionable Intelligence required today.
ThreatScape Global Intelligence
Simply put, iSIGHT Partners global threat intelligence
is unique in the industry. Our team of more than
300 experts are positioned around the globe
and apply decades of experience to their
work. We focus on the threats that will
actually affect you in the future so your
security team can become proactive.
The Result
Our clients have the broadest
and clearest possible picture
of the global threat landscape
available today. Unlike other
vendors that provide raw threat
data, our experts deliver high-
fidelity analysis derived from
multiple sources including
human intelligence, open
sources, active community
engagement, connections to the
threat underground and criminal
marketplaces, and real-time
data collected from a variety of
technical sources. You will have
access to a substantial intelligence
database we have amassed in
nearly a decade of operations
that is actionable and provides
the context required.
©2015 iSIGHT Partners, Inc. All Rights Reserved.
isightpartners.com | info@isightpartners.com
Cyber Crime focuses primarily on threats from financially motivated actors.
Cyber Espionage concentrates on adversaries that target corporate and government entities
to collect information for the purpose of strategic advantage.
Hacktivism tracks politically or ideologically motivated threats expressing beliefs or
attempting to project power through malicious or destructive online activity.
Enterprise is strategically focused on the threat, geopolitical, and legal trends affecting the
business enterprise, including cloud, mobile, and smart devices.
Critical Infrastructure focuses on cyber threats against corporate and national infrastructure.
Vulnerability & Exploitation are tracked from discovery to patching, exploit development,
regional propagation of code, ongoing malicious campaigns observed in the wild.
©2015 iSIGHT Partners, Inc. All Rights Reserved.
isightpartners.com | info@isightpartners.com
The ThreatScape Advantage
Your ThreatScape subscription provides multiple ways for your
organization to consume cutting-edge cyber threat intelligence.
•	 MySIGHT Portal: Provides online, on-demand access to the complete library
of historical reporting for your specific subscriptions and enables you to configure
push delivery methods including:
•	 Email Alerts and Digests: MySIGHT can be configured to push new
ThreatScape reports or digests via email alerts to your designated resources.
•	 SMS Alerts: To ensure that your team has access to real-time information,
regardless of their location, MySIGHT pushes SMS alerts to mobile devices.
•	 ThreatScape Media Highlights: A daily email that is invaluable in helping
you track the latest security story, answer inbound questions from business
executives, or preempt questions by proactively sending analysis to executives
and board members. Our team tracks breaking news, analyzes the accuracy of
important stories, and correlates our research with ThreatScape reports – giving
you the truth and detailed analysis behind the headlines.
•	 ThreatScape API & SDK: Enables you to fuse iSIGHT’s cyber threat intelligence
with your security infrastructure. With ThreatScape API, you can easily integrate
ThreatScape intelligence with your security, risk, and compliance management
technologies. A wide variety of technology partners have already leveraged
our API to build“out of the box”integrations with their platforms
•	 Out of the Box Partner Integrations: Make your best of breed security,
risk and compliance management solutions better with the world’s best
cyber threat intelligence.
Comprehensive Onboarding and Support System
iSIGHT is a true partner with our clients. Our unique comprehensive onboarding and
support system ensure you are able to take maximum advantage of the cyber threat
intelligence we produce.
•	 Client Engagement manager: As part of your ThreatScape subscription,
iSIGHT Partners assigns you a dedicated Client Engagement (CE) manager.
This individual acts as your primary point of contact and gathers your
on-going intelligence requirements. Additionally, the CE manager acts
as your point of contact for customer inquiries which are included as part
of ThreatScape subscriptions.
•	 Applied Intelligence Workshop: Included in your subscription is the Applied
Intelligence workshop that orients and assists you on integrating iSIGHT’s threat
intelligence into your environment with the minimum set of tools, processes
and procedures necessary to take full advantage of your iSIGHT offering.
Another unique aspect of our ThreatScape offerings is the direct access you
and your team will have with our expert analysts. Your dedicated CE specialist
will shepherd you through the inquiry process and ensure the appropriate expert
or team provides the answers you need. Two types of inquiries are included with
ThreatScape subscriptions:
•	 Analyst Access: Analyst access enables clients to ask questions and get
clarification about the intelligence covered in your ThreatScape subscription
•	 Global Response: The ability to request technical analysis in the form of a Global
Response report is also included. This involves the examination of malware
samples, exploits, and network activity provided by your firm, including cross
correlation to our broad library of intelligence.
ThreatScape® Deliverables
Intelligence Streams
•	 Over one hundred ThreatScape reports
each month (across all topics)
•	 Daily ThreatScape Media Highlights emails
•	 MySIGHT Portal – Access to all historical
reporting and email/SMS alerts
•	 ThreatScape API and SDK
•	 ThreatScape Browser Plugin
•	 Out of the Box Integrations
Reports
•	 Clarifications and Custom Intelligence
Reports
•	 Analyst Access - direct access to analysts
•	 Global Response – Malware analysis
and reverse engineering, technical
indicator investigation
•	 Threat Investigation Reports* - Detailed
reporting on a specific threat topic
•	 Focused Intelligence Reports* -
White paper
Dedicated Client Support
•	 Dedicated client engagement manager
for ongoing client support
•	 Comprehensive intelligence workshop
to ensure you are quickly leveraging
intelligence in your processes via
partner integrations
•	 Intelligence Requirements development
(on-going)
•	 Formal Briefings
*Denotes an optional service at additional cost

More Related Content

Viewers also liked

Talleres plan de mejoramiento 7
Talleres plan de mejoramiento 7Talleres plan de mejoramiento 7
Talleres plan de mejoramiento 7
docentes2013
 

Viewers also liked (17)

El arte contemporáneo frente a la crisis ecológica Lourdes Valeriano
El arte contemporáneo frente a la crisis ecológica Lourdes ValerianoEl arte contemporáneo frente a la crisis ecológica Lourdes Valeriano
El arte contemporáneo frente a la crisis ecológica Lourdes Valeriano
 
Kover
KoverKover
Kover
 
OpenEye Digital Video Recorder Overview
OpenEye Digital Video Recorder OverviewOpenEye Digital Video Recorder Overview
OpenEye Digital Video Recorder Overview
 
Rincian minggu efektif kwh kelas x smk
Rincian minggu efektif kwh kelas x smkRincian minggu efektif kwh kelas x smk
Rincian minggu efektif kwh kelas x smk
 
LinkedIn Workshop: Create and Optimize Your LInkedIn Profile
LinkedIn Workshop: Create and Optimize Your LInkedIn ProfileLinkedIn Workshop: Create and Optimize Your LInkedIn Profile
LinkedIn Workshop: Create and Optimize Your LInkedIn Profile
 
Talleres plan de mejoramiento 7
Talleres plan de mejoramiento 7Talleres plan de mejoramiento 7
Talleres plan de mejoramiento 7
 
Yarn quality and customer satisfaction
Yarn quality and customer satisfactionYarn quality and customer satisfaction
Yarn quality and customer satisfaction
 
Arte popular guatemalteco
Arte popular guatemaltecoArte popular guatemalteco
Arte popular guatemalteco
 
Presentasi kewirausahaan
Presentasi kewirausahaanPresentasi kewirausahaan
Presentasi kewirausahaan
 
Impact of Bearing Vibration on yarn quality in Ring Frame
Impact of Bearing Vibration on yarn quality in Ring FrameImpact of Bearing Vibration on yarn quality in Ring Frame
Impact of Bearing Vibration on yarn quality in Ring Frame
 
Power Key Elements of a Thermal Power Generation
Power Key Elements of a Thermal Power GenerationPower Key Elements of a Thermal Power Generation
Power Key Elements of a Thermal Power Generation
 
Muisca, quimbaya y Tairona
Muisca, quimbaya y TaironaMuisca, quimbaya y Tairona
Muisca, quimbaya y Tairona
 
2. analisis alokasi waktu
2. analisis alokasi waktu2. analisis alokasi waktu
2. analisis alokasi waktu
 
ESCUELA DE GLASGOW, MACKINTOSH
ESCUELA DE GLASGOW, MACKINTOSHESCUELA DE GLASGOW, MACKINTOSH
ESCUELA DE GLASGOW, MACKINTOSH
 
Analytics Teams: 5 Things You Need to Know Before You Deploy Your Model
Analytics Teams: 5 Things You Need to Know Before You Deploy Your ModelAnalytics Teams: 5 Things You Need to Know Before You Deploy Your Model
Analytics Teams: 5 Things You Need to Know Before You Deploy Your Model
 
235801505 cc
235801505 cc235801505 cc
235801505 cc
 
Embarazo precoz
Embarazo precozEmbarazo precoz
Embarazo precoz
 

FireEye iSIGHT-Partners-ThreatScape-datasheet

  • 1. Actionable Cyber Threat Intelligence ThreatScape® Arm Your Team with Relevant, Actionable Intelligence ThreatScape® cyber threat intelligence equips enterprises with strategic, operational and tactical analysis derived by our global team of experts. ThreatScape subscriptions provide the intelligence necessary to align your security program with business risk management goals and to proactively defend against new and emerging cyber threats. With intelligence coverage across the threat landscape, along with rich contextual reporting that includes the motivation and intent of adversaries, their campaigns and technical indicators, the malware used, and the vulnerabilities being exploited, ThreatScape arms your team with the Actionable Intelligence required today. ThreatScape Global Intelligence Simply put, iSIGHT Partners global threat intelligence is unique in the industry. Our team of more than 300 experts are positioned around the globe and apply decades of experience to their work. We focus on the threats that will actually affect you in the future so your security team can become proactive. The Result Our clients have the broadest and clearest possible picture of the global threat landscape available today. Unlike other vendors that provide raw threat data, our experts deliver high- fidelity analysis derived from multiple sources including human intelligence, open sources, active community engagement, connections to the threat underground and criminal marketplaces, and real-time data collected from a variety of technical sources. You will have access to a substantial intelligence database we have amassed in nearly a decade of operations that is actionable and provides the context required. ©2015 iSIGHT Partners, Inc. All Rights Reserved. isightpartners.com | info@isightpartners.com Cyber Crime focuses primarily on threats from financially motivated actors. Cyber Espionage concentrates on adversaries that target corporate and government entities to collect information for the purpose of strategic advantage. Hacktivism tracks politically or ideologically motivated threats expressing beliefs or attempting to project power through malicious or destructive online activity. Enterprise is strategically focused on the threat, geopolitical, and legal trends affecting the business enterprise, including cloud, mobile, and smart devices. Critical Infrastructure focuses on cyber threats against corporate and national infrastructure. Vulnerability & Exploitation are tracked from discovery to patching, exploit development, regional propagation of code, ongoing malicious campaigns observed in the wild.
  • 2. ©2015 iSIGHT Partners, Inc. All Rights Reserved. isightpartners.com | info@isightpartners.com The ThreatScape Advantage Your ThreatScape subscription provides multiple ways for your organization to consume cutting-edge cyber threat intelligence. • MySIGHT Portal: Provides online, on-demand access to the complete library of historical reporting for your specific subscriptions and enables you to configure push delivery methods including: • Email Alerts and Digests: MySIGHT can be configured to push new ThreatScape reports or digests via email alerts to your designated resources. • SMS Alerts: To ensure that your team has access to real-time information, regardless of their location, MySIGHT pushes SMS alerts to mobile devices. • ThreatScape Media Highlights: A daily email that is invaluable in helping you track the latest security story, answer inbound questions from business executives, or preempt questions by proactively sending analysis to executives and board members. Our team tracks breaking news, analyzes the accuracy of important stories, and correlates our research with ThreatScape reports – giving you the truth and detailed analysis behind the headlines. • ThreatScape API & SDK: Enables you to fuse iSIGHT’s cyber threat intelligence with your security infrastructure. With ThreatScape API, you can easily integrate ThreatScape intelligence with your security, risk, and compliance management technologies. A wide variety of technology partners have already leveraged our API to build“out of the box”integrations with their platforms • Out of the Box Partner Integrations: Make your best of breed security, risk and compliance management solutions better with the world’s best cyber threat intelligence. Comprehensive Onboarding and Support System iSIGHT is a true partner with our clients. Our unique comprehensive onboarding and support system ensure you are able to take maximum advantage of the cyber threat intelligence we produce. • Client Engagement manager: As part of your ThreatScape subscription, iSIGHT Partners assigns you a dedicated Client Engagement (CE) manager. This individual acts as your primary point of contact and gathers your on-going intelligence requirements. Additionally, the CE manager acts as your point of contact for customer inquiries which are included as part of ThreatScape subscriptions. • Applied Intelligence Workshop: Included in your subscription is the Applied Intelligence workshop that orients and assists you on integrating iSIGHT’s threat intelligence into your environment with the minimum set of tools, processes and procedures necessary to take full advantage of your iSIGHT offering. Another unique aspect of our ThreatScape offerings is the direct access you and your team will have with our expert analysts. Your dedicated CE specialist will shepherd you through the inquiry process and ensure the appropriate expert or team provides the answers you need. Two types of inquiries are included with ThreatScape subscriptions: • Analyst Access: Analyst access enables clients to ask questions and get clarification about the intelligence covered in your ThreatScape subscription • Global Response: The ability to request technical analysis in the form of a Global Response report is also included. This involves the examination of malware samples, exploits, and network activity provided by your firm, including cross correlation to our broad library of intelligence. ThreatScape® Deliverables Intelligence Streams • Over one hundred ThreatScape reports each month (across all topics) • Daily ThreatScape Media Highlights emails • MySIGHT Portal – Access to all historical reporting and email/SMS alerts • ThreatScape API and SDK • ThreatScape Browser Plugin • Out of the Box Integrations Reports • Clarifications and Custom Intelligence Reports • Analyst Access - direct access to analysts • Global Response – Malware analysis and reverse engineering, technical indicator investigation • Threat Investigation Reports* - Detailed reporting on a specific threat topic • Focused Intelligence Reports* - White paper Dedicated Client Support • Dedicated client engagement manager for ongoing client support • Comprehensive intelligence workshop to ensure you are quickly leveraging intelligence in your processes via partner integrations • Intelligence Requirements development (on-going) • Formal Briefings *Denotes an optional service at additional cost