Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Incident Response

IID Launches Threat Sharing and Collaboration Platform

Tacoma, Washington-based IID, launched a new information sharing platform this week, where government agencies and enterprises can share data about the latest threats and ongoing attacks.

Tacoma, Washington-based IID, launched a new information sharing platform this week, where government agencies and enterprises can share data about the latest threats and ongoing attacks.

Called ActiveTrust, the platform enables participating organizations to exchange threat intelligence and coordinate response between organizations.

“ActiveTrust accelerates big collaboration for actionable security intelligence by giving organizations a better way to get the security information they need; creating a dynamic, aligned and private community of security peers,” the company explained.

InternetIdentity

The ActiveTrust platform consists of three elements:

Controlled Exchange – ActiveTrust members are prescreened and must agree to a common set of rules for confidentiality and information usage. The threat exchange platform includes data governance controls, so members can dictate what, where, when and with whom they share—even anonymously.

Efficient Intelligence Delivery – ActiveTrust takes disparate sources of data in various formats and standardizes it, offloading the work needed to translate data and making the intelligence instantly actionable. By plugging actionable data into whatever gear organizations have, every existing security investment becomes more valuable and powerful.

Broad-Based Collaboration – Participation in ActiveTrust gives security professionals instant access to a wealth of data from a variety of allies and peers in the security ecosystem. ActiveTrust members also have the ability to share insights and discuss best practices through various features on ActiveTrust’s social network.

ActiveTrust Data Flow

Dozens of Fortune 500 companies and U.S. government agencies are already utilizing the platform to power their existing security infrastructure, IID said.

Advertisement. Scroll to continue reading.

“Much like cybercriminals have leveraged intelligence exchanges to carry out their attacks, ActiveTrust provides the ‘good guys’ with their own sharing networks to gather information vital to fending off attacks,” said IID CEO Lars Harvey. “IID has spent more than ten years making connections between organizations to secure their networks, so it’s only logical that we are launching a threat exchange platform that makes it faster, easier and more efficient than ever for organizations to identity and defend themselves against cyberattacks.”

ActiveTrust is priced at $300,000 per year for a large enterprise subscription.

In November 2013, IID, also known as “Internet Identity”, announced that it has raised $8 million in Series A funding from Bessemer Venture Partners.

Additional information on ActiveTrust is available here.

Written By

For more than 15 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join us as we delve into the transformative potential of AI, predictive ChatGPT-like tools and automation to detect and defend against cyberattacks.

Register

As cybersecurity breaches and incidents escalate, the cyber insurance ecosystem is undergoing rapid and transformational change.

Register

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...

Data Breaches

LastPass DevOp engineer's home computer hacked and implanted with keylogging malware as part of a sustained cyberattack that exfiltrated corporate data from the cloud...

Cybersecurity Funding

2022 Cybersecurity Year in Review: Top news headlines and trends that impacted the security ecosystem

Cybersecurity Funding

Network security provider Corsa Security last week announced that it has raised $10 million from Roadmap Capital. To date, the company has raised $50...

Endpoint Security

Today, on January 10, 2023, Windows 7 Extended Security Updates (ESU) and Windows 8.1 have reached their end of support dates.