Brookcourt Solutions

Recorded Future Threat Intelligence

Contextualized threat intelligence is a vital component of any proactive security strategy. Relevant insights, updated in real time, integrated with your existing infrastructure drives faster and more informed security decisions. Our goal is to empower your organisation to proactively defend against threats at the speed and scale of the internet.

Features

  • Real-time Brand Monitoring
  • Indicator (IOC) Enrichment
  • Vulnerability Validation and Prioritisation
  • Dark Web Monitoring
  • Threat Hunting
  • Threat Research
  • Real Time Alerting
  • Connect API for 3rd Party Technology Integration

Benefits

  • Unrivalled Cyber Security Related Data Collection
  • Real-time Collection and Alerting
  • World Class Cyber Security Research Team

Pricing

£9000 to £90000 per licence per year

  • Free trial available

Service documents

G-Cloud 11

584039048889678

Brookcourt Solutions

Phil higgins

01737886111

charlotte.gurney@brookcourtsolutions.com

Service scope

Service scope
Software add-on or extension Yes, but can also be used as a standalone service
What software services is the service an extension to The Recorded Future Browser extension can be used to enrich a range of entities within web based tools with risk scores and rules. Recorded Future is capable of integrating with any open system capable of ingesting IP, hash, domain, or vulnerability data for correlation and/or enrichment via REST based APIs.
Cloud deployment model Public cloud
Service constraints As a Software as a Service (SaaS) company, Recorded Future has made every effort to limit constraints faced by users of the platform. However, as with any development approach, constraints do exist. Because Recorded Future is web browser based, the biggest constraint comes in the form of access. If our customer is unable to connect to the internet, Recorded Future would be unavailable to analysts. Recorded Future’s databases are hosted in AWS East and have robust DDoS protection. Recorded Future conducts regular assessments to maintain proper controls in the environment ensuring confidentiality, integrity, and assurance.
System requirements Access to a Supported Web Browser

User support

User support
Email or online ticketing support Email or online ticketing
Support response times Max 1.5 business hours
User can manage status and priority of support tickets No
Phone support Yes
Phone support availability 24 hours, 7 days a week
Web chat support No
Onsite support Onsite support
Support levels Recorded Future will undertake efforts necessary to promptly correct any Defect. Customer may report a Defect via Phone, In-Product or Email Support. Company will make reasonable efforts to correct the Defect or provide an acceptable work-around or action plan within the following time frames, depending on Customer’s classification of the Defect. Recorded Future will also provide a dedicated Intelligence Services representative to any customer who will support that customer reach their intelligence goals. This person should been seen as an extension to the customers team and will help on any queries you might have. The goal is that the customers personnel should be able to use Recorded Future to its full potential. All of the above is provided at no additional cost.
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started We will provide free training provided by the customers Intelligence Services representative either in person or over video conference for on-boarding. On top of this, users will be able to access "Recorded Future University" through the dashboard which is full of self-training examples and videos.
Service documentation Yes
Documentation formats HTML
End-of-contract data extraction Before the end of a client's subscription, users can export data from Recorded Future. This includes client specific information (incl Saved Queries, Alerts, and Lists; and User-Generated Analyst Notes and Report Annotations) via the API, and a subset via the UI. Format is typically JSON, CSV or in limited cases STIX Taxii. Additionally, the export function in Recorded Future Enterprise allow you to generate a CSV file containing the events returned by any query. Finally, for clients that purchase the optional Fusion module, there is more flexibility for export.
End-of-contract process Either the end-user customer renews the service or we terminate the service on the contract expiry date and delete any customer related account information . The contract covers product access and support up until the date of expiry.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install No
Designed for use on mobile devices Yes
Differences between the mobile and desktop service The Recorded Future mobile application provides access to all Intelligence cards with Risk Scores. The web interface will work with mobile browsers and will offer full functionality.
Accessibility standards None or don’t know
Description of accessibility Recorded Future has a 24-hour customer support hotline to assist with user issues.
Accessibility testing Recorded Future currently does not perform any interface testing with users of assistive technology, but does have a 24-hour customer support hotline to assist with user issues.
API Yes
What users can and can't do using the API The API provides programmatic access to threat intelligence content and evidence based risk scores. The API has a straightforward RESTful design with operations for enrichment, monitoring, and correlation. Supported data types include IP addresses, domains and DNS names, file hashes, vulnerabilities, and malware families. The API also has search and lookup operations on entity lists, including threat lists, whitelists, and customer-specific watchlists.
API documentation Yes
API documentation formats HTML
API sandbox or test environment No
Customisation available Yes
Description of customisation Users can upload lists of entities to build queries around and monitor via our Threat Views. Each user is also able to define their role and received targeting threat intelligence and trending data around the area they focus one.

Scaling

Scaling
Independence of resources Recorded Future is built to scale. As the demand increases, whether from a spike in data coming into the system or from a spike in usage through the web app or API, the system scales accordingly to meet the demand. We use AWS to spin up new machines as they are needed.

Analytics

Analytics
Service usage metrics Yes
Metrics types The admin of each organisation is able to review usage metrics for their users API keys. Recorded Future can also, on demand, provide visibility around how much individual users or enterprises as a whole are interacting with the product.
Reporting types
  • Real-time dashboards
  • Reports on request

Resellers

Resellers
Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Other security clearance
Government security clearance Up to Security Clearance (SC)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations EU-US Privacy Shield agreement locations
User control over data storage and processing locations No
Datacentre security standards Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency At least once a year
Penetration testing approach Another external penetration testing organisation
Protecting data at rest Encryption of all physical media
Data sanitisation process No
Equipment disposal approach In-house destruction process

Data importing and exporting

Data importing and exporting
Data export approach Recorded Future holds analyzed data from various sources from the web. This data can be exported as a CSV, JSON or a DOCX file. Customer data only consists of any saved queries, alerts, reports, lists or notes. Reports can be exported as a DOCX, PPTX or PDF. Other views can be exported as PDFs or printed.
Data export formats
  • CSV
  • Other
Data import formats CSV

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks TLS (version 1.2 or above)
Data protection within supplier network TLS (version 1.2 or above)

Availability and resilience

Availability and resilience
Guaranteed availability The Subscription Service will be made available to Customer a minimum of ninety-nine and five tenths percent (99.5%) of the time within any thirty (30) day period. As for being refunded this is what we state PERFORMANCE REMEDIES. If the Availability of the Subscription Service for a Customer drops below 99.5% during a thirty (30) day period (except where Availability suffers due to the exclusions above), the Customer is eligible to receive a Service Credit equal to 10% of the monthly Subscription Fee for such month. Any Service Credits due are aggregated over the year and applied as a discount to the next annual bill or, in the case of the last year of a contract, the Subscription Term is extended at no charge, based on a pro-rata calculation of additional time due that equates to the value of the aggregated Service Credits. This represents Customer’s sole and exclusive remedy, and Recorded Future’s sole obligation, for Subscription Service Unavailability or failure to meet the Availability percentage.
Approach to resilience Recorded Future uses AWS. The system is spread over 4 zones to manage any fail over requirements. The system itself is designed to be able to move from a failing machine to another. Backups are stored in 2 different AWS locations.
Outage reporting Via status.recordedfuture.com - a dashboard that can be viewed online as well as subscribed to via email and mobile phone text messages.

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication
  • 2-factor authentication
  • Identity federation with existing provider (for example Google Apps)
  • Username or password
Access restrictions in management interfaces and support channels Management and configuration of the service requires Recorded Future administrative privileges for the customer account. Support channels require a Recorded Future account.
Access restriction testing frequency At least every 6 months
Management access authentication
  • 2-factor authentication
  • Username or password

Audit information for users

Audit information for users
Access to user activity audit information Users receive audit information on a regular basis
How long user audit data is stored for At least 12 months
Access to supplier activity audit information No audit information available
How long system logs are stored for Less than 1 month

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications Yes
Any other security certifications SOC2

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified Yes
Security governance standards Other
Other security governance standards SOC 2 Type I SOC 2 Type II
Information security policies and processes Recorded Future uses a combination of encryption, highly trained staff, numerous information security policies and technical safeguards to protect our customers’ data. Recorded Future’s information security program includes measures such as: Encrypted and hashed passwords Active DDoS mitigation Automated account lockouts Extensive facility access controls Multi-factor authentication Comprehensive threat intelligence program Automated security scans of our systems Active penetration testing Extensive internal security awareness program and training for employees Recorded Future Vulnerability Reporting Program Lastly, Recorded Future has a dedicated product security team that scours our service for potential vulnerabilities, and helps our engineers ship secure code. All customer data stored by Recorded Future is located in data centers secured by Amazon Web Services (AWS), which offers unparalleled physical and information security. These servers are housed separately from Recorded Future’s corporate offices, and are distributed globally. AWS has been certified to meet the following standards: SOC 3; FIPS 140-2; ISO 27001; ISO 27017; ISO 27018; and ISO 9001. AWS servers hosting Recorded Future customer data can only be accessed via two-factor secured VPN. Recorded Future itself is certified to be SOC 2 Type 1 and SOC 2 Type 2 compliant, and currently undergoing an ISO 27001 audit.

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach Any new feature or component follows our planning process. Any new feature or changes to an existing one are described from a use case perspective and a solution is documented. Jira is used for tracking all development tasks form start to finish. All features are reviewed and signed off by the security team.
Vulnerability management type Supplier-defined controls
Vulnerability management approach Recorded Future uses Detectify for bi-weekly vulnerability scans as well as recurring Pen Tests (minimum once per year). Recorded Future runs on AWS with their own scans. Patches can be deployed immediately. Recorded Future also uses our own service together with Splunk to monitor, analyse and remedy any potential threats.
Protective monitoring type Supplier-defined controls
Protective monitoring approach Recorded Future is using an instance of Splunk together with Recorded Future for active monitoring. And potential compromise follows our defined security guidelines. We monitor 24 by 7 and any critical incident is acted upon immediately.
Incident management type Supplier-defined controls
Incident management approach The Recorded Future Information Security Team plus any other required employee will evaluate and determine a response strategy: - Confirm Existence and Scope of Incident - Ascertain Incident Status (In Progress) - Confirm, Catalog and Confirm Damage to Data/Property - Confirm Impact to the Business [Minimal, Serious, Critical] - Locate, Isolate and Contain Any Impacted Systems - Categorize Incident (Malware, Intrusion, Damage etc.) - Determine Response and Remediation Timeline both Internally & Externally - Determine Law Enforcement Escalation.

Secure development

Secure development
Approach to secure software development best practice Conforms to a recognised standard, but self-assessed

Public sector networks

Public sector networks
Connection to public sector networks No

Pricing

Pricing
Price £9000 to £90000 per licence per year
Discount for educational organisations No
Free trial available Yes
Description of free trial Free Trials are generated on a case by case basis and provided in a proof of concept context.

Service documents

pdf document: Pricing document pdf document: Terms and conditions
Service documents
Return to top ↑