Solution Brief

Part of Flashpoint’s Global Intelligence Team, the Physical Security & Counterterrorism Team is dedicated to empowering decision makers with the intelligence and raw data needed to protect an organization’s people, infrastructure, and other assets.

Added:
QuickLook

Flashpoint collects and analyzes threat data from a diverse set of sources to deliver critical intelligence.

Added:
Solution Brief

Flashpoint informs decision makers on emerging trends that affect policy and threats to Federal programs. Our unique position to glean information from the DDW allows us to incorporate highly differentiated and signal-rich, unclassified data into our analysis, as well as provide access to primary sources.

Added:
Case Study

Flashpoint broadens the scope of cyber intelligence beyond threat detection to areas like physical security, providing the relevant context to business units not traditionally afforded the benefits of intelligence derived from illicit communities.

Added:
Solution Brief

Flashpoint Professional Services offerings enable intelligence and investigations teams to support further analysis, and produce intelligence in support of their mission. Flashpoint’s services enable teams to augment their current operations, plan and build programs that map to specific intelligence requirements, and train teams to build the necessary skills to perform the duties to support their mission.

Added:
Whitepaper

This paper intends to examine the information security risks innate to the public sector IT supply chain for software and hardware, and their effect on the integrity and availability of federal IT systems and data. It will also enumerate the various standards and impending bills governing the security of the public-sector supply chain.

Added:
Solution Brief

Flashpoint offerings align to every step in the intelligence cycle; by monitoring and identifying publicly available closed source and vetted communities of interest in support of intelligence needs and collection requirements. Flashpoint’s unique access to illicit online communities, enables intelligence teams to perform further analysis, and produce intelligence in support of their mission.

Added:
Solution Brief

Actionable intelligence on adversaries operating within illicit online communities is indispensable in support of many missions. Access to information on terrorist activity and recruitment, the spread of jihadi propaganda, cyberattacks, fraudulent activity, malicious insiders, supply-chain threats, and more is difficult and, in some instances, could be dangerous to obtain.

Added:
Solution Brief

Organizations need to protect their customer base and have insight into whether data has been compromised. Compromised Credentials Monitoring - Customer allows organizations to monitor for compromised customer credentials, while enabling enterprises to prevent fraudulent activity and protect their client base.

Added:
Solution Brief

Abuse of enterprise credentials allows attackers onto your network and exposes sensitive business and personal data. Compromised Credentials Monitoring - Enterprise enables organizations to search and monitor Flashpoint’s unique collections for compromised enterprise accounts and passwords in order to flag accounts, reset employee passwords, and restrict permissions to prevent actors from accessing confidential or personally identifiable information (PII).

Added:
Solution Brief

Flashpoint Compromised Credentials Monitoring (CCM) allows users to monitor exposure of compromised credentials for their employee and customer email addresses to take action after breaches to mitigate risk of account takeover (ATO).

Added:
Webinar

Watch now, the recorded webinar, and check out other helpful resources from CrowdStrike that highlight 2020 healthcare industry threat trends, emerging best practices – like the 1/10/60 operational cyber security metric – and evaluate standards across HiTrust, NIST CSF and much more.

Added:
Video

Swapnil Bhartiya, TFIR, sat down with Don Maclean, Chief Cyber Security Technologist at DLT Solutions, a Tech Data Company, to discuss remote working challenges caused by the pandemic.

Added:
Case Study

Illumio has been named a leader in The Forrester Wave™: Zero Trust eXtended Ecosystem Platform Providers, Q4 2019 report, receiving the highest overall ranking in the current offering category and the highest scores possible in the workload security, visibility and analytics, automation and orchestration, manageability and usability, APIs, vision and strategy, and advocacy criteria.

Added:
Whitepaper

Today’s federal IT leaders are faced with a broad range of challenges for securing their applications and environments. For example, agencies in the middle of migrating legacy applications to the cloud and/or deploying new cloud-native applications, as part of efforts to modernize government services, are under pressure to keep up with FISMA, DHS, NIST, and OMB guidelines.

Added: