“In addition to a machine-readable threat intelligence feed, IID also has a cloud-based platform for threat intelligence federation, according to Andersen. With the IID cloud platform, customers and organizations can share threat intelligence, which is another large opportunity for growth at Infoblox, he said.”
2015 Ponemon Study Released
It’s easy to be overwhelmed by threat intelligence. The sheer volume and alerts generated can swamp an IT staff. So the thought of adding even more data sources can make your head spin. All this data is supposed to make us more secure, but it can just be more complicated.
We are the experts leading the way in distilling conclusive, reliable data from many trusted sources, and delivering timely, usable information the way you need it, when you need it, allowing you to easily repeat the process.
ActiveTrust is the best way to acquire, focus and deliver your threat intelligence.
We created ActiveTrust, one of the largest commercial threat intelligence networks, to collect, focus and deliver clear, actionable data to Fortune 50 companies, state and federal government entities, top security experts, law enforcement at every level around the world—and now, you.
ActiveTrust accelerates big collaboration on a global scale, with the speed and ease of social networking. You get timely, concise security intelligence you can act on, distributed through a private, peer-based platform.
The ActiveTrust Data
Threat intelligence data from IID is some of the most highly refined and reliable information available anywhere. Timely and accurate, we provide data you can immediately put to use on the front lines of your cyberdefense infrastructure.Find Out More
A culture of curiosity. An ethic of diligence. A passion for what’s right. That’s what drives the cybersecurity experts and veteran technologists behind IID. Our executive team consists of globally respected thought leaders who help guide government policy and play prominent roles in industry associations.
Vice President of Marketing
The “tricks” of winning—persistence, goal setting and overcoming adversity—are as valuable to Mark today as they were playing college football.
Sharing Threat Intelligence
IID CEO, Lars Harvey, talks about the importance of sharing cybercrime threat intelligence.