IDEFENSE INTELLIGENCE RESEARCH

IDEFENSE INTELLIGENCE RESEARCH

The mission of Verisign iDefense Intelligence Research is to collect, analyse and package intelligence of importance in order to provide security practitioners with situational awareness and mitigation strategies pertaining to enterprise threats.

E-mail an Expert

By serving as a hub for public and private research and partnership, iDefense plans and directs cross-functional intelligence process and knowledge-sharing across six distinct intelligence reams to provide a comprehensive, yet relevant perspective of the threat environment.

OUR METHODOLOGY

Verisign® iDefense® Security Intelligence Services deliver timely, proactive intelligence using a proven methodology for discovery and analysis. The existence of vulnerability does not always pose a threat to the enterprise. With finite resources and more organised attackers, defense of critical IT assets requires security intelligence – knowing which threats pose the greatest risk to an organisation’s infrastructure and business goals or mission.

>Cyber Threat Analysis Diagram

DISCOVERY

We discover vulnerabilities and track the development of tools to exploit them. Our vulnerability teams filter data from mailing lists, websites and proprietary sources into consolidated views of new publicly disclosed vulnerabilities related to more than 10,000 products and technologies. Our threat intelligence teams monitor activities related to cyber security on a global scale through malware discovery and geopolitical threat research from ongoing field operations in suspect regions and exercises multilingual threat collection in more than 20 spoken languages.

ANALYSIS

Our cutting-edge research and development teams conduct detailed analysis of vulnerabilities and exploit code and malicious code to find out how they work and who created them. Organised attacks from known actors pose a greater risk of organised assault on valued systems than independent hackers. We develop scan checks, IDS signatures and workarounds to protect threatened systems and translate that information into actionable intelligence to help security teams implement efficient and accurate remediation and response strategies.

PUBLICATION: ALERTS, REPORTS AND BRIEFINGS

Collaboration across multiple intelligence teams that comprise the iDefense organisation prioritises and categorises intelligence for delivery in regularly scheduled advisories and updates or as alerts requiring immediate attention. We rely on auto-analysis and deep human analysis around malicious code and vulnerabilities. iDefense earned the status of Leading Provider of Exclusive Vulnerabilities in 2009 from Frost & Sullivan. iDefense discoveries or Zero-day Vulnerabilities becomes part of our analysis, which iDefense customers receive, on average, 100+ days before vendors make them public.

DELIVERY

iDefense offers multiple secure delivery methods. The primary means of delivery include e-mail, XML webservice or appliance; iDefense secure and encrypted portal allowing customised user delivery profiling; via an RSS feed.

iDefense customers and vendors are notified of threats and vulnerabilities before making research public. See the current vulnerability advisories.

Contact Us

Learn more about Verisign’s iDefense Security Intelligence Services and how to improve your security strategy.

E-mail an Expert

NEED MORE INFO?