Security Experts:

Connect with us

Hi, what are you looking for?


Incident Response

IID Launches Threat Sharing and Collaboration Platform

Tacoma, Washington-based IID, launched a new information sharing platform this week, where government agencies and enterprises can share data about the latest threats and ongoing attacks.

Tacoma, Washington-based IID, launched a new information sharing platform this week, where government agencies and enterprises can share data about the latest threats and ongoing attacks.

Called ActiveTrust, the platform enables participating organizations to exchange threat intelligence and coordinate response between organizations.

“ActiveTrust accelerates big collaboration for actionable security intelligence by giving organizations a better way to get the security information they need; creating a dynamic, aligned and private community of security peers,” the company explained.


The ActiveTrust platform consists of three elements:

Controlled Exchange – ActiveTrust members are prescreened and must agree to a common set of rules for confidentiality and information usage. The threat exchange platform includes data governance controls, so members can dictate what, where, when and with whom they share—even anonymously.

Efficient Intelligence Delivery – ActiveTrust takes disparate sources of data in various formats and standardizes it, offloading the work needed to translate data and making the intelligence instantly actionable. By plugging actionable data into whatever gear organizations have, every existing security investment becomes more valuable and powerful.

Broad-Based Collaboration – Participation in ActiveTrust gives security professionals instant access to a wealth of data from a variety of allies and peers in the security ecosystem. ActiveTrust members also have the ability to share insights and discuss best practices through various features on ActiveTrust’s social network.

ActiveTrust Data Flow

Dozens of Fortune 500 companies and U.S. government agencies are already utilizing the platform to power their existing security infrastructure, IID said.

“Much like cybercriminals have leveraged intelligence exchanges to carry out their attacks, ActiveTrust provides the ‘good guys’ with their own sharing networks to gather information vital to fending off attacks,” said IID CEO Lars Harvey. “IID has spent more than ten years making connections between organizations to secure their networks, so it’s only logical that we are launching a threat exchange platform that makes it faster, easier and more efficient than ever for organizations to identity and defend themselves against cyberattacks.”

ActiveTrust is priced at $300,000 per year for a large enterprise subscription.

In November 2013, IID, also known as “Internet Identity”, announced that it has raised $8 million in Series A funding from Bessemer Venture Partners.

Additional information on ActiveTrust is available here.

Written By

For more than 10 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.


Websites of German airports, administration bodies and banks were hit by DDoS attacks attributed to Russian hacker group Killnet

Data Breaches

GoTo said an unidentified threat actor stole encrypted backups and an encryption key for a portion of that data during a 2022 breach.

Network Security

NSA publishes guidance to help system administrators identify and mitigate cyber risks associated with transitioning to IPv6.

CISO Strategy

Cybersecurity-related risk is a top concern, so boards need to know they have the proper oversight in place. Even as first-timers, successful CISOs make...

Identity & Access

Hackers rarely hack in anymore. They log in using stolen, weak, default, or otherwise compromised credentials. That’s why it’s so critical to break the...


A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Cybersecurity Funding

Forward Networks, a company that provides network security and reliability solutions, has raised $50 million from several investors.