Lookingglass Integrates iSIGHT's Cyber Threat Analysis

Lookingglass Cyber Solutions, a cyber security company whose platform delivers emerging network threat intelligence, will integrate iSIGHT’s industry leading cyber intelligence with the Lookingglass' cyber threat analysis platform, ScoutVision. iSIGHT Partners is a provider of global cyber intelligence

This combination will enable advanced security organizations to proactively manage threats at the time that they infiltrate the environments of organizations or their suppliers. Shared customers of iSIGHT and Lookingglass will be able to understand adversaries’ attack methodologies and implement countermeasures prior to an incident.

This integration provides customers visibility into the attack surface utilized by sophisticated adversaries targeting them and/or their suppliers - a key pillar to effective cyber threat management. “In essence, iSIGHT Partners creates scouting reports that articulate the tactics, techniques and procedures of sophisticated adversaries and Lookingglass lets you know which team you are playing,” explained John Watters, Chairman and CEO of iSIGHT Partners. “As iSIGHT’s global cyber intelligence organization collects and analyzes threat intelligence worldwide, Lookingglass is able to rapidly disseminate that intelligence to customers within the context of their business operations. In simple terms, the integrated capability makes it easy for customers to know what they need to know about the cyber threat environment as soon as intelligence is collected.”

“Threat intelligence is an imperative for effective cyber security teams across government and the private sector. Our partnership with iSIGHT allows us to deeply enrich our intelligence feeds to customers by providing critical insights on immediate threats,” added Derek Gabbard, CEO of Lookingglass. “We worked closely with iSIGHT to integrate its cyber threat analysis within ScoutVision’s existing portal interface, so that shared customers can readily receive the benefit of wider, contextual, actionable intelligence today, without having to manually compare reports or deal with a separate console or interface.”

Under terms of the relationship, shared Lookingglass and iSIGHT customers will be able to access iSIGHT’s detailed threat intelligence reports on malicious actors’ campaigns, threats and motivations through Lookingglass’s ScoutVision platform. Adversary insight from iSIGHT complements Lookingglass’s view of emerging threat intelligence from a network perspective, giving security managers a more strategic and contextual view of both attackers’ motives and favored techniques and the emerging exploits actually being employed against target organizations worldwide.
 

Featured

  • Cloud Adoption Gives Way to Hybrid Deployments

    Cloud adoption is growing at an astonishing rate, with Gartner forecasting that worldwide public cloud end-user spending will approach $600 billion by the end of this year—an increase of more than 21% over 2022. McKinsey believes that number could eclipse $1 trillion by the end of the decade, further underscoring the industry’s exponential growth. Read Now

  • AI on the Edge

    Discussions about the merits (or misgivings) around AI (artificial intelligence) are everywhere. In fact, you’d be hard-pressed to find an article or product literature without mention of it in our industry. If you’re not using AI by now in some capacity, congratulations may be in order since most people are using it in some form daily even without realizing it. Read Now

  • Securing the Future

    In an increasingly turbulent world, chief security officers (CSOs) are facing a multitude of challenges that threaten the stability of businesses worldwide. Read Now

    • Guard Services
  • Security Entrances Move to Center Stage

    Most organizations want to show a friendly face to the public. In today’s world, however, the need to keep people safe and secure has become a prime directive when designing and building facilities of all kinds. Fortunately, there is no need to construct a fortress-like entry that provides that high level of security. Today’s secured entry solutions make it possible to create a welcoming, attractive look and feel at the entry without compromising security. It is for this reason that security entrances have moved to the mainstream. Read Now

Featured Cybersecurity

New Products

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation. 3

  • Mobile Safe Shield

    Mobile Safe Shield

    SafeWood Designs, Inc., a manufacturer of patented bullet resistant products, is excited to announce the launch of the Mobile Safe Shield. The Mobile Safe Shield is a moveable bullet resistant shield that provides protection in the event of an assailant and supplies cover in the event of an active shooter. With a heavy-duty steel frame, quality castor wheels, and bullet resistant core, the Mobile Safe Shield is a perfect addition to any guard station, security desks, courthouses, police stations, schools, office spaces and more. The Mobile Safe Shield is incredibly customizable. Bullet resistant materials are available in UL 752 Levels 1 through 8 and include glass, white board, tack board, veneer, and plastic laminate. Flexibility in bullet resistant materials allows for the Mobile Safe Shield to blend more with current interior décor for a seamless design aesthetic. Optional custom paint colors are also available for the steel frame. 3

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3