ESET Threat Intelligence, Telemetry & Intelligence Feeds
ESET’s Threat Intelligence service provides global knowledge gathered by ESET experts on targeted attacks, botnet activity detection, advanced persistent threats (APTs), zero-days and botnet activities. Our comprehensive services offer real-time monitoring, threat analysis, potential risk detection, potential risk mitigation and actionable insights before they can impact your operations.
Features
- MALICIOUS FILES FEED - Realtime Malware information, IOC characteristics.
- DOMAIN FEED - Block malicious domains, names, ip addresses
- URL FEED Block malicious addresses and hosting domain insights
- BOTNET FEED Tracks botnets activity, Command & Control servers
- Botnet tracking targets, includes detections, hash, last alive
- IP FEED understand malicious IP prevalence, block malicious Ips
- APT FEED Real time threat landscape alerting, proactive security.
- APT THREAT REPORTING - Access detailed PDF reports,
- Threat reports, threat hunting, data on adversaries and their activities.
- Vulnerability intelligence through attack vector analysis, understand threat actor behaviour
Benefits
- Metadata-rich and detailed feeds, reduced false positives
- Low-size data, high relevancy data, deduplicated and confidence-scored data
- Advanced filtering, threat vectors, researcher insights and security intelligence
- Market-leading, especially in botnet data, botnet data intelligence, botnet visibility
- Low maintenance requirements due to curated content and threat data
- Real-time feeds - prevalent, updated and real-time IoCs
- Seamless integration process, our threat intelligence solutions within your environment.
- Customized reports, analyses, tailored threat insights aligning to your needs
- Improved security posture, supply chain and real time monitoring,
- Real-time alerting, real-time monitoring, security operations intelligence, threat investigation
Pricing
£39,000 to £234,000 a unit a year
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
1 1 4 5 5 0 8 7 3 0 5 4 4 6 3
Contact
ESET UK Limited
Gabriel Le Roux
Telephone: 01202 405405
Email: gabriel.leroux@eset.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Public cloud
- Service constraints
- Customer must have their their own SIEM, SOAR or TIP platform
- System requirements
-
- Internet Access
- SIEM, SOAR or TIP Platform
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Typically within one working day
- User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- No
- Support levels
- Standard Support is included from 8:30 to 17:00 MON - FRI in the form of a ticketing system.
- Support available to third parties
- No
Onboarding and offboarding
- Getting started
- We offer full documentation and initial training on how to integrate into your platforms.
- Service documentation
- Yes
- Documentation formats
- HTML
- End-of-contract data extraction
- The service stops working, we hold no user data.
- End-of-contract process
- Any supplied feeds cease to work, contract ends, and the customer chooses to keep any historical data.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Application to install
- No
- Designed for use on mobile devices
- No
- Service interface
- Yes
- User support accessibility
- None or don’t know
- Description of service interface
- Our feeds are delivered in either TAXII 1.1 or TAXII 2.1 and can be in the form of JSON or STIX 2.1
- Accessibility standards
- None or don’t know
- Description of accessibility
- We have not tested the feeds for accessibility
- Accessibility testing
- We have not tested the interface for accessibility
- API
- No
- Customisation available
- No
Scaling
- Independence of resources
- N/a
Analytics
- Service usage metrics
- No
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Staff screening not performed
- Government security clearance
- None
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- European Economic Area (EEA)
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- In-house
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Other
- Other data at rest protection approach
-
Data at rest are encrypted with Azure encryption by default:
https://learn.microsoft.com/en-us/azure/security/fundamentals/encryption-overview. We can provide more details upon a request. - Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- This would be done through the customer's own SIEM, SOAR or TIP platform
- Data export formats
- Other
- Other data export formats
-
- Not offered
- Would be done through customer's own SIEM, SOAR, TIP platform
- Data import formats
- Other
- Other data import formats
-
- Not offered
- Would be done through customer's own SIEM, SOAR, TIP platform
Data-in-transit protection
- Data protection between buyer and supplier networks
- Other
- Other protection between networks
- Authentication tokens are used when the feeds are configured.
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
- Our target is to provide 99.5% service availability. Our effort and well-defined processes drive this endeavour. In the event of an ESET PROTECT (console) service outage, endpoints remain secure and unaffected. With ESET Professional Services we guarantee Response Time based incident severity level: Critical - 2 hours, Serious - 4 hours, Common - 1 workday.
- Approach to resilience
- Datacenters hosting instances themselves are hosted in Azure. We store data in 2 geo-locations within the selected instance region. More information is available on request.
- Outage reporting
- We inform console administrators about maintenance in advance in the console itself. Status of the service is monitored actively. Public dashboard is available at https://status.eset.com
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Username or password
- Access restrictions in management interfaces and support channels
- We apply least privileges principle. Only defined staff are eligible to access the data and based on support case only.
- Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- SGS United Kingdom Ltd.
- ISO/IEC 27001 accreditation date
- 05/10/2018
- What the ISO/IEC 27001 doesn’t cover
- Extend of mandatory certified part: 1. Extend of Integrated Management System mandatory certified part implementation is bordered by: a. Location (ESET HQ, offices in Bratislava, H1 hosting); b. All organizational units of ESET, included in core processes, subprocesses and all process which support the core processes (Management process, Core processes, Supporting processes); c. All organizational units of ESET Group, included in development, operation and delivery of cloud solution management processes and subprocesses (ESET Protect HUB, ESET Protect Cloud, ESET Business Account, Cloud MDM, ESET MSP Administrator, ESET Cloud Offie Security, ESET Dynamic Threat Defense, ESET Inspect Cloud). 2. Information and communication systems being used in processes defined in par. b. and information and communication systems which supports them. There are no organizational units, processes, assets, information, information and communication systems nor localities excluded from scope as defined in part. 1.
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- Yes
- Any other security certifications
- Data Protection Registration Certificate (ICO)
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
-
- ISO/IEC 27001
- Other
- Other security governance standards
- ISO 9001
- Information security policies and processes
- We stick to ISO 27001 standard and have information security policy in place. We have CISO and Internal security team who is responsible for internal processes definition, alignment with best security principles. Employees are periodically trained in security and must report any security incident via agreed channels.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- Change is prepared and planned together with all relevant teams including QA and security and approved by necessary stakeholders, depending on nature of change. Software or configuration changes are prepared and deployed over DEV environment. Once basic, mostly automated, tests are passed and desired functionality is delivered by change, the change is deployed to TEST environment where more rigorous testing including integration testing is performed automatically or manually. After successful testing the change is deployed over PROD.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- Services are periodically scanned for vulnerabilities when introduced to production. One part of vulnerability assessment system is checking missing patches. In case of any missing patches we prepare new "gold" image which is deployed on DEV/TEST environment to undergo internal tests and vulnerability assessment. Right after a verification image is deployed to PRODUCTION environment. Patches are applied as soon as possible or in patching windows. We use our own security research along with 3rd party vulnerability resources and also OSINT.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- We have monitoring systems like perimeter firewalls, IDS, OS hardening and internal SOC team. Response to potential incident is defined in internal policies. Measures found during lessons learned are applied. We have 24/7 internal security monitoring to ensure all incidents are addressed and responded.
- Incident management type
- Supplier-defined controls
- Incident management approach
- This is covered in Incident Response Procedures. Incidents response process is divided into 6 phases that cascade to incident closure - preparation, identification, containment, eradication, recovery, Lessons learned. Users can report incidents via ESET's ticketing system ( VIA Tech Support) . Incident reports are available to incident stakeholders only (IT, Internal security etc.)
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Equal opportunity
- Wellbeing
Equal opportunity
ESET’s Code of Ethics and Integrity is based on ESET values and reflects the culture of
integrity and high standards to which we hold ourselves. It is an important resource to
help us, as employees, to make the right decisions and take actions that are consistent
with ESET’s vision, mission, values, and our pledge to society. Everything we do,
we try to do honestly and transparently. We honour our commitments and take
responsibility for all our actions. We obey the law, act in accordance with regulations
and ensure that our partners and clients can always rely on us.Wellbeing
As an employer we aim to create and promote a workplace environment that supports and promotes the well-being of all employees. We understand that exercise, mental health and well-being go hand in hand.
Pricing
- Price
- £39,000 to £234,000 a unit a year
- Discount for educational organisations
- No
- Free trial available
- Yes
- Description of free trial
- Web Portal to show all data you would see and how you can implement it into your own systems.
- Link to free trial
- This is on request