SHARE

The company claims it provides threat intelligence to 91 percent of the Fortune 100 companies. Its customers include Fujitsu, Accenture, T-Mobile, Duke Energy, and St. Jude Medical.

Its new software-as-a-service (SaaS), called Fusion, uses machine learning to centralize and customize proprietary and internal threat data with external threat intelligence. It also provides analysis across open and closed threat intelligence feeds, internal risk lists, and internally generated security analyst notes.

The security landscape is becoming increasingly complex, and most companies don’t have the manpower to manually collect and analyze disparate intelligence feeds, said Matt Kodama, VP of product at Recorded Future. Fusion fills this gap by integrating intelligence and presenting it in a unified platform.

“There’s way too much for humans to keep up with,” he said.“It’s got to be a combination where as much of the work as possible is pushed off to computing, and the human on top of it rides off into victory. We’re saying externalize that to us. We’ll find the data, combine the data, be your threat intelligence architects, and we’ll provide all of that to you as a SaaS.”

Fusion essentially provides three benefits to companies, Kodama added. They are: centralization, customization, and collaboration.

It manages multiple threat intelligence tools from different sources and vendors and centralizes this data. Customers can access and manage it all from one place.

The product also customizes the data, allowing companies to tailor it to their particular needs and use cases. This is important because in order to be useful, threat information needs to be “very precise and granular,” Kodama said.

Third, the threat intelligence data that is gathered isn’t siloed within one security team. The software allows companies to share the data across business teams so everyone has access to it and can share notes about the intelligence.

“With Fusion we give them a place to capture that threat knowledge so they will see the latest information and be able to connect the dots because a SOC [security operations center] doesn’t necessarily use the same tools as IT,” Kodama said.

<<< This article was originally published on SDxCentral’s website here. >>>