FireEye iSIGHT-Partners-ThreatScape-datasheet
- 1. Actionable Cyber Threat Intelligence
ThreatScape®
Arm Your Team with Relevant, Actionable Intelligence
ThreatScape® cyber threat intelligence equips enterprises with strategic,
operational and tactical analysis derived by our global team of experts.
ThreatScape subscriptions provide the intelligence necessary to align your
security program with business risk management goals and to proactively
defend against new and emerging cyber threats. With intelligence coverage
across the threat landscape, along with rich contextual reporting that includes
the motivation and intent of adversaries, their campaigns and technical
indicators, the malware used, and the vulnerabilities being exploited,
ThreatScape arms your team with the Actionable Intelligence required today.
ThreatScape Global Intelligence
Simply put, iSIGHT Partners global threat intelligence
is unique in the industry. Our team of more than
300 experts are positioned around the globe
and apply decades of experience to their
work. We focus on the threats that will
actually affect you in the future so your
security team can become proactive.
The Result
Our clients have the broadest
and clearest possible picture
of the global threat landscape
available today. Unlike other
vendors that provide raw threat
data, our experts deliver high-
fidelity analysis derived from
multiple sources including
human intelligence, open
sources, active community
engagement, connections to the
threat underground and criminal
marketplaces, and real-time
data collected from a variety of
technical sources. You will have
access to a substantial intelligence
database we have amassed in
nearly a decade of operations
that is actionable and provides
the context required.
©2015 iSIGHT Partners, Inc. All Rights Reserved.
isightpartners.com | info@isightpartners.com
Cyber Crime focuses primarily on threats from financially motivated actors.
Cyber Espionage concentrates on adversaries that target corporate and government entities
to collect information for the purpose of strategic advantage.
Hacktivism tracks politically or ideologically motivated threats expressing beliefs or
attempting to project power through malicious or destructive online activity.
Enterprise is strategically focused on the threat, geopolitical, and legal trends affecting the
business enterprise, including cloud, mobile, and smart devices.
Critical Infrastructure focuses on cyber threats against corporate and national infrastructure.
Vulnerability & Exploitation are tracked from discovery to patching, exploit development,
regional propagation of code, ongoing malicious campaigns observed in the wild.
- 2. ©2015 iSIGHT Partners, Inc. All Rights Reserved.
isightpartners.com | info@isightpartners.com
The ThreatScape Advantage
Your ThreatScape subscription provides multiple ways for your
organization to consume cutting-edge cyber threat intelligence.
• MySIGHT Portal: Provides online, on-demand access to the complete library
of historical reporting for your specific subscriptions and enables you to configure
push delivery methods including:
• Email Alerts and Digests: MySIGHT can be configured to push new
ThreatScape reports or digests via email alerts to your designated resources.
• SMS Alerts: To ensure that your team has access to real-time information,
regardless of their location, MySIGHT pushes SMS alerts to mobile devices.
• ThreatScape Media Highlights: A daily email that is invaluable in helping
you track the latest security story, answer inbound questions from business
executives, or preempt questions by proactively sending analysis to executives
and board members. Our team tracks breaking news, analyzes the accuracy of
important stories, and correlates our research with ThreatScape reports – giving
you the truth and detailed analysis behind the headlines.
• ThreatScape API & SDK: Enables you to fuse iSIGHT’s cyber threat intelligence
with your security infrastructure. With ThreatScape API, you can easily integrate
ThreatScape intelligence with your security, risk, and compliance management
technologies. A wide variety of technology partners have already leveraged
our API to build“out of the box”integrations with their platforms
• Out of the Box Partner Integrations: Make your best of breed security,
risk and compliance management solutions better with the world’s best
cyber threat intelligence.
Comprehensive Onboarding and Support System
iSIGHT is a true partner with our clients. Our unique comprehensive onboarding and
support system ensure you are able to take maximum advantage of the cyber threat
intelligence we produce.
• Client Engagement manager: As part of your ThreatScape subscription,
iSIGHT Partners assigns you a dedicated Client Engagement (CE) manager.
This individual acts as your primary point of contact and gathers your
on-going intelligence requirements. Additionally, the CE manager acts
as your point of contact for customer inquiries which are included as part
of ThreatScape subscriptions.
• Applied Intelligence Workshop: Included in your subscription is the Applied
Intelligence workshop that orients and assists you on integrating iSIGHT’s threat
intelligence into your environment with the minimum set of tools, processes
and procedures necessary to take full advantage of your iSIGHT offering.
Another unique aspect of our ThreatScape offerings is the direct access you
and your team will have with our expert analysts. Your dedicated CE specialist
will shepherd you through the inquiry process and ensure the appropriate expert
or team provides the answers you need. Two types of inquiries are included with
ThreatScape subscriptions:
• Analyst Access: Analyst access enables clients to ask questions and get
clarification about the intelligence covered in your ThreatScape subscription
• Global Response: The ability to request technical analysis in the form of a Global
Response report is also included. This involves the examination of malware
samples, exploits, and network activity provided by your firm, including cross
correlation to our broad library of intelligence.
ThreatScape® Deliverables
Intelligence Streams
• Over one hundred ThreatScape reports
each month (across all topics)
• Daily ThreatScape Media Highlights emails
• MySIGHT Portal – Access to all historical
reporting and email/SMS alerts
• ThreatScape API and SDK
• ThreatScape Browser Plugin
• Out of the Box Integrations
Reports
• Clarifications and Custom Intelligence
Reports
• Analyst Access - direct access to analysts
• Global Response – Malware analysis
and reverse engineering, technical
indicator investigation
• Threat Investigation Reports* - Detailed
reporting on a specific threat topic
• Focused Intelligence Reports* -
White paper
Dedicated Client Support
• Dedicated client engagement manager
for ongoing client support
• Comprehensive intelligence workshop
to ensure you are quickly leveraging
intelligence in your processes via
partner integrations
• Intelligence Requirements development
(on-going)
• Formal Briefings
*Denotes an optional service at additional cost