News Feed Item

iSIGHT Partners Automates Integration With HP ArcSight Platform

iSIGHT Partners, the cyber threat intelligence experts, today announced interoperability of iSIGHT Partners ThreatScape® intelligence with the HP ArcSight Security Information and Event Management (SIEM) platform. With this capability, organizations using HP ArcSight can now directly access high fidelity cyber threat intelligence – including deep contextual information on adversary motivation, tactics, techniques, and technical indicators – for enhanced security and risk management.

Cyber security professionals have access to vast amounts of event data for shaping security policies and responding to threats. Very little of that data is tailored to their organizations’ unique profile or integrated with their existing security intelligence systems. The result is a gap between the collection of cyber security intelligence and the application of that intelligence to ongoing security operations.

Enabling interoperability between iSIGHT Partners and the HP ArcSight platform helps to close that gap. The HP-certified interoperability between the ThreatScape® API and HP ArcSight delivers technical indicators tied to intelligence analysis in the common event framework (CEF) format. Leveraging this interoperability, organizations can get immediate, automated connection of threat intelligence to events, prioritizing and expediting security actions.

“Gauging which security events are most important remains a fundamental goal for security operations teams across the globe,” said Frank Mong, vice president and general manager, Solutions, Enterprise Security Products, HP. “Interoperability between HP ArcSight and ThreatScape will help SOC teams more quickly and efficiently prioritize events so they can focus more limited resources on the highest risk threats.”

iSIGHT Partners ThreatScape® provides cyber threat intelligence and associated technical indicators gathered from 200+ native language speakers in 16 countries. This actionable insight keeps cyber security organizations one step ahead of threats, and enables security leaders to separate real issues from passing distractions.

“iSIGHT Partners customers using HP ArcSight are already ahead of the curve when it comes to leveraging security event data,” said John P. Watters, chief executive officer, iSIGHT Partners. “Enabling organizations to connect security intelligence data from HP ArcSight with rich threat context is the next step in the maturation of cyber security to intelligence-led operations.”

Intelligence with Intelligence

More than just a data feed, the ThreatScape® API provides robust, actionable threat intelligence:

  • Comprehensive: Conveys more than seven years of comprehensive adversary focused threat, technical, and vulnerability intelligence sourced globally.
  • Context-rich: Provides for significant enhancement to organizational security by injecting context into data-driven automated prioritization and decision-making.
  • Industry standard: REST-based with outputs in a variety of existing and emerging industry standard formats including STIX, JSON, and XML.
  • Easy to use: Includes a concise developer guide with references for commonly used programming languages like C, C++, C#, Python, PHP, and Java.
  • Secure: Communicates over the HTTPS protocol with standard key and digest-based authentication.

For more information on ThreatScape® or ThreatScape® API, please contact: [email protected] or go to www.isightpartners.com/threatscapeAPI

About iSIGHT Partners

iSIGHT Partners is the leading global provider of cyber threat intelligence. With 200+ experts in 16 countries and expertise in 24 languages, only iSIGHT can deliver the full context and intent of the most damaging threats, allowing security organizations to respond faster, defend proactively, and invest smarter. Find iSIGHT Partners on the web at www.iSIGHTpartners.com or email us at [email protected]

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
DXWorldEXPO LLC announced today that Dez Blanchfield joined the faculty of CloudEXPO's "10-Year Anniversary Event" which will take place on November 11-13, 2018 in New York City. Dez is a strategic leader in business and digital transformation with 25 years of experience in the IT and telecommunications industries developing strategies and implementing business initiatives. He has a breadth of expertise spanning technologies such as cloud computing, big data and analytics, cognitive computing, m...
Digital Transformation and Disruption, Amazon Style - What You Can Learn. Chris Kocher is a co-founder of Grey Heron, a management and strategic marketing consulting firm. He has 25+ years in both strategic and hands-on operating experience helping executives and investors build revenues and shareholder value. He has consulted with over 130 companies on innovating with new business models, product strategies and monetization. Chris has held management positions at HP and Symantec in addition to ...
Cloud-enabled transformation has evolved from cost saving measure to business innovation strategy -- one that combines the cloud with cognitive capabilities to drive market disruption. Learn how you can achieve the insight and agility you need to gain a competitive advantage. Industry-acclaimed CTO and cloud expert, Shankar Kalyana presents. Only the most exceptional IBMers are appointed with the rare distinction of IBM Fellow, the highest technical honor in the company. Shankar has also receive...
There is a huge demand for responsive, real-time mobile and web experiences, but current architectural patterns do not easily accommodate applications that respond to events in real time. Common solutions using message queues or HTTP long-polling quickly lead to resiliency, scalability and development velocity challenges. In his session at 21st Cloud Expo, Ryland Degnan, a Senior Software Engineer on the Netflix Edge Platform team, will discuss how by leveraging a reactive stream-based protocol,...
Enterprises have taken advantage of IoT to achieve important revenue and cost advantages. What is less apparent is how incumbent enterprises operating at scale have, following success with IoT, built analytic, operations management and software development capabilities - ranging from autonomous vehicles to manageable robotics installations. They have embraced these capabilities as if they were Silicon Valley startups.
DXWorldEXPO LLC announced today that Kevin Jackson joined the faculty of CloudEXPO's "10-Year Anniversary Event" which will take place on November 11-13, 2018 in New York City. Kevin L. Jackson is a globally recognized cloud computing expert and Founder/Author of the award winning "Cloud Musings" blog. Mr. Jackson has also been recognized as a "Top 100 Cybersecurity Influencer and Brand" by Onalytica (2015), a Huffington Post "Top 100 Cloud Computing Experts on Twitter" (2013) and a "Top 50 C...
Digital transformation is about embracing digital technologies into a company's culture to better connect with its customers, automate processes, create better tools, enter new markets, etc. Such a transformation requires continuous orchestration across teams and an environment based on open collaboration and daily experiments. In his session at 21st Cloud Expo, Alex Casalboni, Technical (Cloud) Evangelist at Cloud Academy, explored and discussed the most urgent unsolved challenges to achieve fu...
The standardization of container runtimes and images has sparked the creation of an almost overwhelming number of new open source projects that build on and otherwise work with these specifications. Of course, there's Kubernetes, which orchestrates and manages collections of containers. It was one of the first and best-known examples of projects that make containers truly useful for production use. However, more recently, the container ecosystem has truly exploded. A service mesh like Istio addr...
As DevOps methodologies expand their reach across the enterprise, organizations face the daunting challenge of adapting related cloud strategies to ensure optimal alignment, from managing complexity to ensuring proper governance. How can culture, automation, legacy apps and even budget be reexamined to enable this ongoing shift within the modern software factory? In her Day 2 Keynote at @DevOpsSummit at 21st Cloud Expo, Aruna Ravichandran, VP, DevOps Solutions Marketing, CA Technologies, was jo...
Predicting the future has never been more challenging - not because of the lack of data but because of the flood of ungoverned and risk laden information. Microsoft states that 2.5 exabytes of data are created every day. Expectations and reliance on data are being pushed to the limits, as demands around hybrid options continue to grow.
Poor data quality and analytics drive down business value. In fact, Gartner estimated that the average financial impact of poor data quality on organizations is $9.7 million per year. But bad data is much more than a cost center. By eroding trust in information, analytics and the business decisions based on these, it is a serious impediment to digital transformation.
Business professionals no longer wonder if they'll migrate to the cloud; it's now a matter of when. The cloud environment has proved to be a major force in transitioning to an agile business model that enables quick decisions and fast implementation that solidify customer relationships. And when the cloud is combined with the power of cognitive computing, it drives innovation and transformation that achieves astounding competitive advantage.
As IoT continues to increase momentum, so does the associated risk. Secure Device Lifecycle Management (DLM) is ranked as one of the most important technology areas of IoT. Driving this trend is the realization that secure support for IoT devices provides companies the ability to deliver high-quality, reliable, secure offerings faster, create new revenue streams, and reduce support costs, all while building a competitive advantage in their markets. In this session, we will use customer use cases...
Digital Transformation: Preparing Cloud & IoT Security for the Age of Artificial Intelligence. As automation and artificial intelligence (AI) power solution development and delivery, many businesses need to build backend cloud capabilities. Well-poised organizations, marketing smart devices with AI and BlockChain capabilities prepare to refine compliance and regulatory capabilities in 2018. Volumes of health, financial, technical and privacy data, along with tightening compliance requirements by...
Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life settlement products to hedge funds and investment banks. After, he co-founded a revenue cycle management company where he learned about Bitcoin and eventually Ethereal. Andrew's role at ConsenSys Enterprise is a mul...