Threat Intelligence - Flashpoint
Flashpoint empowers organizations to gather insight, monitor illicit chatter, inform critical decisions, within a single user-friendly interface. Flashpoint draws intelligence from across deep, dark, and surface web, providing unmatched visibility into threat landscapes. Flashpoint enables users to understand adversaries, TTPs, threats, combining raw data collection, analytics, human-powered intelligence.
Features
- Flashpoint Physical Security Intelligence (PSI),
- Flashpoint Cyber Threat Intelligence (CTI),
- Vulnerability Management (VulnDB)
Benefits
- Enables translation, analyse, monitor geo-enriched data to understand critical events
- Enables translation, analyse, monitor geo-enriched data to understand geopolitical situations
- Enables translation, analyse, monitor geo-enriched data to understand executive threats
Pricing
£12,150 a licence
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
3 2 8 5 1 9 5 2 2 0 3 3 6 9 9
Contact
Brookcourt Solutions
Phil Higgins
Telephone: 01737 886111
Email: contact@brookcourtsolutions.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Public cloud
- Service constraints
- No
- System requirements
- None, product is cloud based SaaS platform
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- We respond during normal business hours M-F 8am-6pm; If weekend response time is needed, that is specified in the contract agreement
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 AAA
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
- Service levels are contract dependent
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- Inititial training and familiarization is part of the contract. Flashpoint can also do periodic training sessions for new users. If contracted, we provide customers access to the Flashpoint Academy for more advanced training which can include onsite training.
- Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
- N/A. We do not store user data
- End-of-contract process
- This will vary depending on the contract and specific services purchased
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Microsoft Edge
- Firefox
- Chrome
- Application to install
- No
- Designed for use on mobile devices
- No
- Service interface
- Yes
- User support accessibility
- WCAG 2.1 AAA
- Description of service interface
- GUI
- Accessibility standards
- WCAG 2.1 AAA
- Accessibility testing
- Ukw
- API
- Yes
- What users can and can't do using the API
- Comprehensive API documentation is provided. We can help with initial API integrations but full integration support and engineering resources can be bought via contract.
- API documentation
- Yes
- API documentation formats
-
- HTML
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
- Flashpoint offers flexible packaging to address the diverse needs of our customer base
Scaling
- Independence of resources
- SLAs
Analytics
- Service usage metrics
- Yes
- Metrics types
- Platform dependent: we can provide last login or logins over a defined period or number queries and queries performed if applicable
- Reporting types
- Regular reports
Resellers
- Supplier type
- Reseller providing extra support
- Organisation whose services are being resold
- Flashpoint Threat Intelligence
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- Other locations
- User control over data storage and processing locations
- No
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
- Other
- Other data at rest protection approach
- Data is encrypted at rest using AES-256
- Data sanitisation process
- No
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
- Users can export data directly from the platform
- Data export formats
-
- CSV
- Other
- Other data export formats
- API cURL commands
- Data import formats
- Other
- Other data import formats
- None. Users cannot upload data to Flashpoint
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
- Flashpoint maintains a SLA and can be provided for review
- Approach to resilience
- This is available upon reqest
- Outage reporting
- If there is a widespread outage, we send out formal notifications to the entire customer base. For any issues that are localized, customer success will reach out to the specific customer.
Identity and authentication
- User authentication needed
- Yes
- User authentication
- 2-factor authentication
- Access restrictions in management interfaces and support channels
- Access is restricted using the model of least privilege and network access controls
- Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Dedicated link (for example VPN)
- Username or password
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- No
- Cyber essentials plus
- No
- Other security certifications
- Yes
- Any other security certifications
- SOC2 Type II
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- Other
- Other security governance standards
- SOC 2 Type II
- Information security policies and processes
- Policies follow NIST standards
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
- Changes are input into our Change and incident management system Firehydrant. All changes go through a ticket and a QA process before deployment. All changes are scanned before deployment and high and critical vulnerabilities are remediated before deployment
- Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
- Vulnerability scans are conducted weekly
- Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
- Flashpoint monitors logs, firewalls, WAFs, and other security tools for anomalies. If an issue is detected it is triaged and investigated. If a incident has been identified this is opened in Firehydrant and the team will gather over video conference to discuss and action. Incidents are responded to as soon as they are discovered.
- Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
- Flashpoint maintains an incident response process that defines communication and responsees to incidents. Common incidents have playbooks associated with them. Customers can report incidents to their customer success team and reports are provided for incidents that affect those customers via email.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
Equal opportunityEqual opportunity
Flashpoint are an Equal opportunity company, and believe in equal opportunity
Pricing
- Price
- £12,150 a licence
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- Yes; We provide a free trial of the platforms and solutions, for 3 weeks. All possible sku's can be tested during that time, even if not purchasing.