Lookingglass Integrates iSIGHT's Cyber Threat Analysis

Lookingglass Cyber Solutions, a cyber security company whose platform delivers emerging network threat intelligence, will integrate iSIGHT’s industry leading cyber intelligence with the Lookingglass' cyber threat analysis platform, ScoutVision. iSIGHT Partners is a provider of global cyber intelligence

This combination will enable advanced security organizations to proactively manage threats at the time that they infiltrate the environments of organizations or their suppliers. Shared customers of iSIGHT and Lookingglass will be able to understand adversaries’ attack methodologies and implement countermeasures prior to an incident.

This integration provides customers visibility into the attack surface utilized by sophisticated adversaries targeting them and/or their suppliers - a key pillar to effective cyber threat management. “In essence, iSIGHT Partners creates scouting reports that articulate the tactics, techniques and procedures of sophisticated adversaries and Lookingglass lets you know which team you are playing,” explained John Watters, Chairman and CEO of iSIGHT Partners. “As iSIGHT’s global cyber intelligence organization collects and analyzes threat intelligence worldwide, Lookingglass is able to rapidly disseminate that intelligence to customers within the context of their business operations. In simple terms, the integrated capability makes it easy for customers to know what they need to know about the cyber threat environment as soon as intelligence is collected.”

“Threat intelligence is an imperative for effective cyber security teams across government and the private sector. Our partnership with iSIGHT allows us to deeply enrich our intelligence feeds to customers by providing critical insights on immediate threats,” added Derek Gabbard, CEO of Lookingglass. “We worked closely with iSIGHT to integrate its cyber threat analysis within ScoutVision’s existing portal interface, so that shared customers can readily receive the benefit of wider, contextual, actionable intelligence today, without having to manually compare reports or deal with a separate console or interface.”

Under terms of the relationship, shared Lookingglass and iSIGHT customers will be able to access iSIGHT’s detailed threat intelligence reports on malicious actors’ campaigns, threats and motivations through Lookingglass’s ScoutVision platform. Adversary insight from iSIGHT complements Lookingglass’s view of emerging threat intelligence from a network perspective, giving security managers a more strategic and contextual view of both attackers’ motives and favored techniques and the emerging exploits actually being employed against target organizations worldwide.
 

Featured

New Products

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file.

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.