Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Network Security

Norse Launches Hybrid Threat Intelligence Service

Norse, a provider cyber threat intelligence solutions, today introduced a new intelligence service that leverages a combination of automated and human threat monitoring and analysis to help enterprise security teams detect compromised systems and malicious activity.

Norse, a provider cyber threat intelligence solutions, today introduced a new intelligence service that leverages a combination of automated and human threat monitoring and analysis to help enterprise security teams detect compromised systems and malicious activity.

Dubbed the Norse Intelligence Service, the company is pitching the offering as an “early warning as-a-service” that monitors large enterprise networks and partner and supplier networks from the outside-in to identify compromised systems, spot malicious activity and track attacks in progress.

According to Norse, the new service leverages automated attack telemetry from the global Norse Intelligence Network, which is refined and enriched by Norse’s in-house team of cyberintelligence and counterintelligence fusion analysts, then sent to customers.

Norse Launches Intelligence ServiceThe Norse Intelligence Service includes detailed threat reports, delivered as needed, written by Norse professional analysts hand-picked for each customer.

No on-premise hardware or software is required, and the Norse Intelligence Service can be configured to focus on a single network, or take a broader view to find compromises on intertwined customer, supplier and partner networks, the company said.

The service comes with a web-based dashboard that shows attacks on or emanating from networks, and provides detailed forensic data to help analysts pursue deeper investigations.

Additionally, attacks and indicators of compromise (IOCs) can be filtered and sorted by geolocation of aggressors or targets, protocol, device type, traffic volume, attack velocity or risk score, Norse said.

“The need for expert threat monitoring and analysis has never been greater, but intelligence experts have never been more difficult to hire, with even the largest, most sophisticated organizations having trouble filling the talent gap,” said Tommy Stiansen, CTO and co-founder of Norse. “Meanwhile, the threat landscape has become wildly asymmetric, with individual companies overwhelmed by daily attacks from nation-states, terrorist organizations, multinational organized crime syndicates and thousands of hackers. The new Norse Intelligence Service is designed to fill that talent gap, and level the playing field.”

The Norse Intelligence Service will be available beginning April 20, 2015, with pricing based on network range size and the specific service package desired.

Advertisement. Scroll to continue reading.

Last week the company introduced a new version of its threat intelligence appliance which can actively monitor inbound and outbound network traffic at up to 10 gigabits-per-second, and can work in conjunction with existing security solutions such as next-generation firewalls, intrusion prevention systems, and SIEMs. 

Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Cody Barrow has been appointed as CEO of threat intelligence company EclecticIQ.

Shay Mowlem has been named CMO of runtime and application security company Contrast Security.

Attack detection firm Vectra AI has appointed Jeff Reed to the newly created role of Chief Product Officer.

More People On The Move

Expert Insights

Related Content

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Data Protection

The cryptopocalypse is the point at which quantum computing becomes powerful enough to use Shor’s algorithm to crack PKI encryption.

Cybercrime

As it evolves, web3 will contain and increase all the security issues of web2 – and perhaps add a few more.

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

Artificial Intelligence

The degree of danger that may be introduced when adversaries start to use AI as an effective weapon of attack rather than a tool...

Cybersecurity Funding

Network security provider Corsa Security last week announced that it has raised $10 million from Roadmap Capital. To date, the company has raised $50...

Network Security

Attack surface management is nothing short of a complete methodology for providing effective cybersecurity. It doesn’t seek to protect everything, but concentrates on areas...

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...