Automatically Access Key Intelligence Reports with the Polarity-Flashpoint Integration

Product - Feb 4, 2020

Automatically Access Key Intelligence Reports with the Polarity-Flashpoint Integration cover image

More and more sensitive information ends up on illicit online communities every day, and trying to comprehend all of that information and turn it into actionable intelligence for your organization is difficult. Flashpoint provides Business Risk Intelligence (BRI) to empower organizations worldwide to combat threats and adversaries. Fueled by a combination of sophisticated technology, advanced data collections, and human-powered analysis, Flashpoint tailors its offerings to the needs and requirements of its customers.

With the Polarity-Flashpoint integration, analysts can consume intelligence much more efficiently, enabling them to make better decisions, faster.

What is Flashpoint?

Flashpoint delivers converged intelligence and risk solutions to private- and public-sector organizations worldwide. As the global leader in Business Risk Intelligence (BRI), Flashpoint provides meaningful intelligence to assist organizations in combating threats and adversaries.

The Flashpoint Intelligence Platform grants access to an archive of finished intelligence reports, data from illicit forums, marketplaces, chat services, blogs, paste sites, technical data, card shops, and vulnerability information, in a single, finished intelligence experience.

What does the Polarity - Flashpoint integration do?

The Polarity-Flashpoint integration enables users to search against Flashpoint Finished Intelligence and Technical Data for additional context on information such as IPs, domains and file hashes. This capability brings timely Flashpoint intelligence and analysis to the forefront, enabling analysts to conduct further research into incidents, easily consume intelligence, and make efficient decisions.

The following Flashpoint datasets are currently available via the Polarity-Flashpoint integration.

Finished Intelligence: Access to analytical reports produced by our intelligence analysts. Reports cover a wide spectrum of illicit underground activity, including crimeware, fraud, emerging malware, violent extremism, and physical threats.

Technical Indicators: Enables users access to indicators of compromise (IOCs) and technical data across Flashpoint datasets and those included in Finished Intelligence reports, allowing for seamless integration into users’ workflows and automated tools.

Check out the integration in action below: