View

Sorting

Products found: 2

logo
Offer a reference bonus
1.00

LookingGlass ScoutShield

ScoutShield Threat Intelligence Gateway is a high-assurance, low-touch security appliance designed to work with firewalls to identify and block phishing, malware, and malicious Command-and-Control (C2) domains – disrupting or stopping these threats.

The ScoutShield solution ingests LookingGlass Automated Data Services’ machine-readable threat intelligence to automatically block known phishing URLs, malicious URLs, and malicious C2 Domains.

  • Malicious C2 Domains Feed - Daily updated blacklist of all known C2 botnet servers
  • Phishing URL Feed - Real-time feed of global phishing URLs
  • Malicious URL Feed - Real-time feed of global malicious URLs

ScoutShield’s automated response mechanism allows organizations to respond more efficiently and effectively to threats, so you can combat data breaches, ransomware, and stolen credentials in real-time. Using ScoutShield’s multiple Monitoring and Reporting Dashboards enable your security team to easily determine the effectiveness of policy enforcement, the health of the entire system, and if threat intelligence rule sets have been deployed successfully.

Use ScoutShield to:

  • Protect against known malicious web pages and phishing attacks with 99.99% accuracy
  • Prevent infected devices from communicating with C2 servers automatically
  • Enable your security analysts to mitigate threats in real-time, increasing productivity
  • Deliver digestible insights on using its multiple dashboards: Appliance, System, Threat Intelligence,    
    and Threat Mitigation.
  • Alert your organization of compromises on the network
... Learn more
-
-
ROI-
-
12
1
logo
Offer a reference bonus
0.00

LookingGlass ScoutThreat

ScoutThreat is a Threat Intelligence Platform (TIP) focused on helping the organization operationalize intelligence by allowing threat modeling between atomic indicators and higher-level objects, assigning risk scores, and prioritizing threats as they pertain to your organization. The platform’s built-in security tradecraft allows threat analysts to link atomic indicators such as IP addresses or hashes to higher-level objects such as tactics, techniques, and procedures of a threat actor. This allows for intelligence-specific knowledge management to answer why your organization is being targeted, as well as how to prevent similar future attacks. Identify the Motives & Intent of Your Adversaries Threat Modeling Map low-level indicators to high-level objects, adding context and correlation to adversary attack motives. Risk Scoring Score your threat model to highlight your high-priority risks. Gap Analysis Address your security weaknesses based on your highest priorities.
... Learn more
-
-
ROI-
-
19
16