Skip to main content Skip to Footer

CAPABILITY


iDefense® Security Intelligence

Now part of Accenture Security

OVERVIEW

iDefense empowers its customers’ environments with contextual, timely and actionable security intelligence, enabling businesses and governments to make smarter decisions to defend against new and evolving threats.

iDEFENSE INSIGHTS TO HELP YOUR ORGANIZATION

Improve IT expenditure and resource allocation decisions
Detect, analyze and mitigate attacks faster
Investigate, prioritize and remediate incidents
Increase your security team’s capability and productivity
Evolve existing tools with better visibility
Secure high-value assets and programs from advanced threats

WHAT WE DO

WAYS iDEFENSE CAN HELP YOUR ORGANIZATION

With several decades in business, iDefense Security Intelligence Services has established a proven track record of providing timely, relevant and actionable cyber threat intelligence to the largest organizations in the world. iDefense has helped protect and secure some of the world's most critical infrastructures—with the understanding that today's security practitioners require trusted cyber intelligence to identify and investigate threats, take action and transition to an intelligence-driven security paradigm.

iDEFENSE STRENGTHS AND OFFERINGS

Industries Served

  • Financial Services

  • Products (this includes software vendors, including fin-tech)

  • Communications, Media and Technology

  • Health and Public Services (health plus nonfederal government)

  • Resources

Key Capabilities

  • More Than 40 Threat Intelligence Analysts

  • 100+ Vulnerability Security Researchers Worldwide

  • Proficiency in 20+ Languages

Dedicated Subject Matter Experts in:

  • Malware Reverse Engineering & Countermeasure Creation

  • Vulnerability Discovery & Mitigation

  • Threat Actor Tactics, Techniques & Procedures

  • Intelligence Analysis Tradecraft & Collection

TECHNOLOGY

iDefense empowers people and technology to make timely and intelligent security decisions that are critical to protecting their business.

iDefense IntelGraph

iDefense's next-generation threat intelligence platform is built on graph database technology that allows all facets of threat intelligence (actors, malware, exploits, targets, vulnerabilities, etc.) to be stored in a central repository, interconnected by links that provide rich context to all content. This innovative technology significantly enhances the ability to detect and analyze threats, while accelerating customer notification and remediation actions.

iDefense IntelGraph provides the industry with the most comprehensive database of threat intelligence data, collected from over 18 years of operation, combining technical, operational and human intelligence with unique telemetry and data gleaned from critical Internet infrastructure.

iDefense IntelGraph Application

The iDefense IntelGraph application offers:

  • Visualization of relationships between actors; known infrastructure; tactics, techniques and procedures (TTPs); and other discrete threat elements

  • Ad hoc research flows, allowing security analysts and incident responders to “pivot” from a known data point and further explore the relationships inherent in the threat intelligence data

  • Rich search features, including contextual navigation

  • Customized content delivery and alerting

  • Complete RESTful API providing full programmatic access to all IntelGraph content

  • An approach to evolve your existing security tools and devices and provide them with better visibility and context through automated integration of iDefense threat intelligence.

SERVICE COVERAGE AREAS

Vulnerability Management
Vulnerability Management is about prioritizing patches and mitigating threats, targeting known and unknown vulnerabilities. Vulnerabilities previously unknown to a software vendor are called zero-day vulnerabilities, since no time has been given for patch development. Understanding the intricate relationships between vulnerabilities, exploits, adversaries and their associated TTPs can be a daunting challenge for even the most seasoned information security and risk management professional.

Our Value Proposition
The iDefense Vulnerability Management team researches, collects and analyzes relevant and critical software vulnerabilities in more than 71,000 products from over 1,000 technology vendors, regularly providing deep and rigorous analysis of software vulnerabilities at least 100 days before public disclosure. Zero-day vulnerabilities are discovered by our in-house lab and by leveraging a network of more than 100 worldwide security research contributors through the iDefense Vulnerability Contributor Program. In-house vulnerability discovery is typically accomplished via source code audits and fuzz testing.


Cybercrime
As cybercrime becomes more organized and professional, security teams are finding it increasingly difficult to keep up with the evolution of cyber-criminal activity and methods. From protecting financial resources and assets to safeguarding customers' personally identifiable information, the challenges of crafting effective defenses depend greatly on actionable intelligence.

Our Value Proposition
iDefense helps organizations defend themselves by understanding how attackers generate income from crimeware and by providing customers with detailed intelligence on the malicious actors, tools and tactics involved. iDefense cyber-crime analysts reverse engineer malware to identify organizations targeted by the attacker, evaluate the effectiveness of the malware, and determine the best way to mitigate an attack. iDefense has deep expertise and sophisticated technologies to help identify and mitigate the risk of fraud for customers engaging in any sort of financial transaction.


Cyber Espionage
iDefense provides threat intelligence that enables organizations to enhance their early-warning capabilities to proactively identify cyber espionage activity. By identifying threat actors and their tools, techniques and procedures, companies can reduce the likelihood and severity of an incident, protecting the business' most important assets. In-depth analysis of individual attack campaigns and their associated infrastructure, motivations, tactics, techniques and procedures enables security teams to identify and contain a discovered threat.

Our Value Proposition
iDefense tracks cyber espionage campaigns emanating from many geographic regions, providing customers with in-depth research around cyber espionage actors' TTPs. Leveraging our vast repository of more than 232 million malware samples, iDefense analysts can provide customers with deep understanding of malicious software identified within their environment. iDefense intelligence helps clients characterize the attacker, provides clients with options for remediation and supports investigative activities—identifying the same threat actor elsewhere in clients’ environments.


Hacktivism
Hacktivist groups are focusing on those whom they perceive to be responsible or complicit in causes they care about—whether driven by ideology, nationalism or the desire for notoriety. Hacktivists can achieve their goals via website defacements, denial of service attacks, social engineering, disclosure of sensitive information, or by spreading propaganda on compromised platforms. Experienced hacktivist groups may focus their efforts on capturing credentials to compromise social media platforms and domain name system (DNS) records for major news, government and corporate entities.

Our Value Proposition
By understanding threats in context, iDefense is able to provide customers with advance warning of threats. iDefense generates qualified threat assessments to confirm the threat credibility posed by the latest malicious operations, identify key actors involved, reveal actors' preferred TTPs, notify customers of emerging threats and possible future attacks, and alert clients of any proprietary data found "dumped" in underground forums.