Skip to main content

Help us improve the Digital Marketplace - send your feedback

Brookcourt Solutions

Threat Intelligence - Flashpoint

Flashpoint empowers organizations to gather insight, monitor illicit chatter, inform critical decisions, within a single user-friendly interface. Flashpoint draws intelligence from across deep, dark, and surface web, providing unmatched visibility into threat landscapes. Flashpoint enables users to understand adversaries, TTPs, threats, combining raw data collection, analytics, human-powered intelligence.

Features

  • Flashpoint Physical Security Intelligence (PSI),
  • Flashpoint Cyber Threat Intelligence (CTI),
  • Vulnerability Management (VulnDB)

Benefits

  • Enables translation, analyse, monitor geo-enriched data to understand critical events
  • Enables translation, analyse, monitor geo-enriched data to understand geopolitical situations
  • Enables translation, analyse, monitor geo-enriched data to understand executive threats

Pricing

£12,150 a licence

  • Education pricing available
  • Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at contact@brookcourtsolutions.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

3 2 8 5 1 9 5 2 2 0 3 3 6 9 9

Contact

Brookcourt Solutions Phil Higgins
Telephone: 01737 886111
Email: contact@brookcourtsolutions.com

Service scope

Software add-on or extension
No
Cloud deployment model
Public cloud
Service constraints
No
System requirements
None, product is cloud based SaaS platform

User support

Email or online ticketing support
Email or online ticketing
Support response times
We respond during normal business hours M-F 8am-6pm; If weekend response time is needed, that is specified in the contract agreement
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
WCAG 2.1 AAA
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
Service levels are contract dependent
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Inititial training and familiarization is part of the contract. Flashpoint can also do periodic training sessions for new users. If contracted, we provide customers access to the Flashpoint Academy for more advanced training which can include onsite training.
Service documentation
Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction
N/A. We do not store user data
End-of-contract process
This will vary depending on the contract and specific services purchased

Using the service

Web browser interface
Yes
Supported browsers
  • Microsoft Edge
  • Firefox
  • Chrome
Application to install
No
Designed for use on mobile devices
No
Service interface
Yes
User support accessibility
WCAG 2.1 AAA
Description of service interface
GUI
Accessibility standards
WCAG 2.1 AAA
Accessibility testing
Ukw
API
Yes
What users can and can't do using the API
Comprehensive API documentation is provided. We can help with initial API integrations but full integration support and engineering resources can be bought via contract.
API documentation
Yes
API documentation formats
  • HTML
  • PDF
API sandbox or test environment
Yes
Customisation available
Yes
Description of customisation
Flashpoint offers flexible packaging to address the diverse needs of our customer base

Scaling

Independence of resources
SLAs

Analytics

Service usage metrics
Yes
Metrics types
Platform dependent: we can provide last login or logins over a defined period or number queries and queries performed if applicable
Reporting types
Regular reports

Resellers

Supplier type
Reseller providing extra support
Organisation whose services are being resold
Flashpoint Threat Intelligence

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
Other locations
User control over data storage and processing locations
No
Datacentre security standards
Managed by a third party
Penetration testing frequency
At least once a year
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
Other
Other data at rest protection approach
Data is encrypted at rest using AES-256
Data sanitisation process
No
Equipment disposal approach
A third-party destruction service

Data importing and exporting

Data export approach
Users can export data directly from the platform
Data export formats
  • CSV
  • Other
Other data export formats
API cURL commands
Data import formats
Other
Other data import formats
None. Users cannot upload data to Flashpoint

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
Flashpoint maintains a SLA and can be provided for review
Approach to resilience
This is available upon reqest
Outage reporting
If there is a widespread outage, we send out formal notifications to the entire customer base. For any issues that are localized, customer success will reach out to the specific customer.

Identity and authentication

User authentication needed
Yes
User authentication
2-factor authentication
Access restrictions in management interfaces and support channels
Access is restricted using the model of least privilege and network access controls
Access restriction testing frequency
At least once a year
Management access authentication
  • 2-factor authentication
  • Dedicated link (for example VPN)
  • Username or password

Audit information for users

Access to user activity audit information
Users contact the support team to get audit information
How long user audit data is stored for
At least 12 months
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
No
Cyber essentials plus
No
Other security certifications
Yes
Any other security certifications
SOC2 Type II

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
Other
Other security governance standards
SOC 2 Type II
Information security policies and processes
Policies follow NIST standards

Operational security

Configuration and change management standard
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach
Changes are input into our Change and incident management system Firehydrant. All changes go through a ticket and a QA process before deployment. All changes are scanned before deployment and high and critical vulnerabilities are remediated before deployment
Vulnerability management type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach
Vulnerability scans are conducted weekly
Protective monitoring type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach
Flashpoint monitors logs, firewalls, WAFs, and other security tools for anomalies. If an issue is detected it is triaged and investigated. If a incident has been identified this is opened in Firehydrant and the team will gather over video conference to discuss and action. Incidents are responded to as soon as they are discovered.
Incident management type
Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach
Flashpoint maintains an incident response process that defines communication and responsees to incidents. Common incidents have playbooks associated with them. Customers can report incidents to their customer success team and reports are provided for incidents that affect those customers via email.

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

Equal opportunity

Equal opportunity

Flashpoint are an Equal opportunity company, and believe in equal opportunity

Pricing

Price
£12,150 a licence
Discount for educational organisations
Yes
Free trial available
Yes
Description of free trial
Yes; We provide a free trial of the platforms and solutions, for 3 weeks. All possible sku's can be tested during that time, even if not purchasing.

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at contact@brookcourtsolutions.com. Tell them what format you need. It will help if you say what assistive technology you use.