With several decades in business, iDefense Security Intelligence Services has established a proven track record of providing timely, relevant and actionable cyber threat intelligence to the largest organizations in the world. iDefense has helped protect and secure some of the world's most critical infrastructures—with the understanding that today's security practitioners require trusted cyber intelligence to identify and investigate threats, take action and transition to an intelligence-driven security paradigm.
Products (this includes software vendors, including fin-tech)
Communications, Media and Technology
Health and Public Services (health plus nonfederal government)
More Than 40 Threat Intelligence Analysts
100+ Vulnerability Security Researchers Worldwide
Proficiency in 20+ Languages
Dedicated Subject Matter Experts in:
Malware Reverse Engineering & Countermeasure Creation
Vulnerability Discovery & Mitigation
Threat Actor Tactics, Techniques & Procedures
Intelligence Analysis Tradecraft & Collection
iDefense empowers people and technology to make timely and intelligent security decisions that are critical to protecting their business.
iDefense's next-generation threat intelligence platform is built on graph database technology that allows all facets of threat intelligence (actors, malware, exploits, targets, vulnerabilities, etc.) to be stored in a central repository, interconnected by links that provide rich context to all content. This innovative technology significantly enhances the ability to detect and analyze threats, while accelerating customer notification and remediation actions.
iDefense IntelGraph provides the industry with the most comprehensive database of threat intelligence data, collected from over 18 years of operation, combining technical, operational and human intelligence with unique telemetry and data gleaned from critical Internet infrastructure.
iDefense IntelGraph Application
The iDefense IntelGraph application offers:
Visualization of relationships between actors; known infrastructure; tactics, techniques and procedures (TTPs); and other discrete threat elements
Ad hoc research flows, allowing security analysts and incident responders to “pivot” from a known data point and further explore the relationships inherent in the threat intelligence data
Rich search features, including contextual navigation
Customized content delivery and alerting
Complete RESTful API providing full programmatic access to all IntelGraph content
An approach to evolve your existing security tools and devices and provide them with better visibility and context through automated integration of iDefense threat intelligence.