Threat Intelligence - Recorded Future
Recorded Future is the most comprehensive and independent threat intelligence cloud platform. We enable organizations to identify and mitigate threats across cyber, supply-chain, physical and fraud domains; and are trusted to get real-time, unbiased and actionable intelligence to reduce risk.
Features
- Ransomware Mitigation - Proactively protect against ransomware attacks.
- Exposure Management - Reduce Exposures Across Your Attack Surface.
- Automate Security Workflows - Reduce threat detection, investigation, response time.
- Digital Risk Protection - Protect digital assets/data from misuse.
- Supply Chain Risk - Mitigate supply chain risk.
Benefits
- Global threat visibility: World’s largest commercial collection platform.
- Real-time Relevance: Dynamic, real-time risk scoring integrated throughout the platform.
- Automated & Human-Analysis : Unmatched combination of speed and quality.
- Context: Transparency in evidence scoring.
- Breadth of Use Cases: Used by the entire Security team.
Pricing
£10,125 a user a year
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
4 9 9 1 1 6 4 0 3 9 8 1 4 7 1
Contact
RAZOR THORN SECURITY LTD
Sophia Durham
Telephone: +447470334993
Email: sophia.durham@razorthorn.com
Service scope
- Service constraints
- No, planned maintenance is communicated ahead of time.
- System requirements
-
- Chrome.
- Safari 9+.
- Edge.
- Firefox.
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
For support cases and RFIs, initial response provided within 1.5 hours during supported business hours: 24 hours a day / Monday - Friday EST.
Delivery of solution or remediation of issue is dependent upon complexity of the issue or request.
Critical Error - Max 1.5 business hours - The objective will be to provide relief to the Customer within twenty-four (24) business hours and provide a Fix within seven (7) business days.
Significant Error - Max 1.5 business hours - Max 7 business days.
Other Error / Support Question - Max 1.5 business hours - Max 7 business days. - User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- No
- Onsite support
- No
- Support levels
-
Recorded Future offers multiple service packages so that our clients realize the maximum value from their Recorded Future investment. The tiers are designed to provide a scope of engagement and capabilities from our Advanced Threat Intelligence Services that work best for client needs based on their Recorded Future deployment.
The Customer Success Package is included in your Recorded Future License. It provides the essential guidance and resources to implement the platform and achieve immediate ongoing value.
The Integration services package is available at an additional cost and provides access to our architects and use case design team as well as configuration support from our integration services team.
The Premium Services Package is available at an additional cost. It includes all services in the integration services package with the addition of an intelligence advisory service. These capabilities include access to engagements and expertise including design and optimisation for intelligence workflows, intelligence requirements development and tailored enablement workshops. - Support available to third parties
- No
Onboarding and offboarding
- Getting started
-
Onboarding will enable you to take full advantage of the powerful tools Recorded Future has to offer. The plan will be tailored to best match your organization’s goals. Ultimately, Onboarding will:
Show you how to use the world-class intelligence and technology that we provide.
Help you accelerate detection and decision-making while reducing response times.
Enable you to embed Recorded Future’s real-time intelligence within your security workflows.
The following resources are available to you every step of Onboarding:
Dedicated Technical Project Manager.
Access to on-demand training through Recorded Future University.
24/7/365 access to technical support via web, email, and phone.
Bi-weekly live, virtual new user training workshops.
Recorded Future Community.
Automated reporting on Recorded Future platform adoption and usage.
Over 25-35 business days, your Recorded Future team will be dedicated to building your confidence and capability in our products
Stage 1 - Kick off and configuration .
Kick-off call.
Alignment on priority objectives.
Capture data assets for monitoring.
Stage 2 - Adoption and Validation.
Virtual training webinar.
Recorded Future University Self-Learning.
Use case workshop.
Alert Tuning workshop.
Stage 3 - Transition and success planning.
Review integration and platform configurations.
Confirm priority security objectives are met. - Service documentation
- Yes
- Documentation formats
-
- HTML
- Other
- Other documentation formats
- Recorded Future Support Portal.
- End-of-contract data extraction
- Recorded Future is a cloud service that provides access to its portal and subsequent services based on the contract length agreed with the client. Upon termination of the contract all client data is deleted so any data should be retrieved before the termination date.
- End-of-contract process
- As a cloud provider the service access is disabled. customer data be exported at any prior to subscription termination, once the subscription is terminated, all logs are deleted in fourteen (14) days, and all back-ups are deleted within six (6) months.
Using the service
- Web browser interface
- Yes
- Using the web interface
- Recorded Future provides a portal based web services where users can access the our platform to solve their complex intelligence use cases. The service automatically provide login details to the user upon contract initiation and the user can set-up their password and 2FA to access the portal. Access roles are agreed upon on-boarding (user/admin) and user can then either make configuration changes or pull data from the platform based on their roles. The key limitations in place would be based on roles, the license type and the agreed length term of the contract.
- Web interface accessibility standard
- None or don’t know
- How the web interface is accessible
- Recorded Future strives to ensure that the Recorded Future website, platform, and application are accessible to the widest possible audience. We are constantly working and investing resources to make our site easier to use for all. Recorded Future has implemented and is in the process of adding new measures to support accessibility. Recorded Future’s Platform and mobile application support accessibility measures such as the ability to zoom in up to 200%, navigate parts of the website using just a keyboard, navigate parts of the website using speech recognition software, and use parts of the service with a screen reader. However, we are not in full compliance with WCAG 2.0 at Level AA, or with ISO/IEC 40500.
- Web interface accessibility testing
- We're striving to meet regulation 508 compliance (https://www.section508.gov/manage/laws-and-policies/) so testing on our interface will aim to meet standards such as compliance with this legislation so that full compliance can be met with WCAG 2.x in the future.
- API
- Yes
- What users can and can't do using the API
-
The core Connect API consists of operations to search and lookup information from Recorded Future's canonical set of cybersecurity Intelligence Card entities:
-IP
-Domain
-Vulnerability
-Hash
-Malware
-URL
-Alert API
The Alert API are a set of operations that allow programmatic access to Recorded Future alerts (excluding Playbook Alerts).
Analyst Note API
Analyst notes can be created, deleted, looked up, and edited via the Analyst Note API. This is incredibly useful for the bulk upload of private threat intelligence into Recorded Future as Analyst Notes.
Company API
You can access and query third-party intelligence data using the Company API.
SOAR API
The SOAR API are a set of operations that can be used for bulk enriching indicators with risk information from the Recorded Future Platform. - API automation tools
- Other
- Other API automation tools
- REST API
- API documentation
- Yes
- API documentation formats
-
- Open API (also known as Swagger)
- HTML
- Command line interface
- No
Scaling
- Scaling available
- Yes
- Scaling type
- Automatic
- Independence of resources
- Recorded Future's service has been built on a scalable architecture and utilising AWS Cloud services so that adequate capacity planning can be made to accommodate for increases in data volume. there is also a dedicated data science team that curates and monitors source coverage which feeds into the capacity planning process. Clients can request collection of sources which in turn is revised by DS and then an evaluation is done as to whether that would impact capacity.
- Usage notifications
- Yes
- Usage reporting
Analytics
- Infrastructure or application metrics
- No
Resellers
- Supplier type
- Reseller (no extras)
- Organisation whose services are being resold
- Recorded Future
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- Other locations
- User control over data storage and processing locations
- No
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
- Other
- Other data at rest protection approach
- To ensure the security of customer and proprietary data throughout its lifecycle, Recorded Future encrypts information both at rest and when it is in motion. Data is stored with Advanced Encryption Standard (AES) 256-bit encryption when at rest.
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Backup and recovery
- Backup and recovery
- Yes
- What’s backed up
-
- Recovery Point Objective (RPO) is 24 hours.
- Recovery Time Objective (RTO) to recreate data/processes is 96 hours.
- Data is kept in 14 daily snapshots.
- Failover systems are automated maintaining the integrity of all data.
- Backup controls
- Backups are automatically generated by Recorded Future, users cannot impact the schedule or change the procedure.
- Datacentre setup
- Multiple datacentres with disaster recovery
- Scheduling backups
- Supplier controls the whole backup schedule
- Backup recovery
- Users contact the support team
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- Other
- Other protection within supplier network
- To ensure the security of customer and proprietary data throughout its lifecycle, Recorded Future encrypts information both at rest and when it is in motion. Data is stored with Advanced Encryption Standard (AES) 256-bit encryption when at rest.
Availability and resilience
- Guaranteed availability
- As our platform is cloud based and hosted in AWS the Recorded Future platform provides an uptime of above 99.9%. We currently do not have planned downtime as calendar items, however where there is a major upgrade we always notify customers of the ongoing work, along with potential services impacted and for how long.
- Approach to resilience
- AWS has identified critical system components required to maintain the availability of our system and recover service in the event of outage. Critical system components are backed up across multiple, isolated locations known as Availability Zones. Each Availability Zone is engineered to operate independently with high reliability. Availability Zones are connected to enable you to easily architect applications that automatically fail-over between Availability Zones without interruption. Highly resilient systems, and therefore service availability, is a function of the system design. Through the use of Availability Zones and data replication, AWS customers can achieve extremely short recovery time and recovery point objectives, as well as the highest levels of service availability.
- Outage reporting
- Outages are reported via our public dashboard and via email to our customers.
Identity and authentication
- User authentication
-
- 2-factor authentication
- Other
- Other user authentication
-
Recorded Future uses a min 16 character password and TOTP to authenticate to the service via the user interface. Recorded Future’s 2FA security is powered by a Time-Based One-Time Password (TOTP). TOTP is a commonly used method for generating one-time-use passwords. Recorded Future supports most authentication apps that comply with the TOTP standard. Recorded Future’s 2FA has been validated to work with the following Authenticator applications.
• Google Authenticator
• Duo Mobile
• Microsoft Authenticator
• Authy
• Okta Verify
• Yubico Authenticator - Access restrictions in management interfaces and support channels
- Access is restricted based on user role and license. Each user has a unique login ID (based on their e-mail) and this can be linked to the clients IDP by making use of our SSO integration. Support is portal based and as such is linked to the access and thus follows the same access principles.
- Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Other
- Description of management access authentication
- We adopt a least privileged access model across our operations, restricting access to systems, applications, and data based on job roles. Access is granted during account creation, aligning with employees' responsibilities. Our security protocols grant different levels of access tailored to job roles; for instance, only the security team can access EDR desktop logs, requiring CEO approval for changes. Role-based user access to production systems is enforced through hardware token-based authentication. Additionally, we utilise AWS's fine-grained access rights system to ensure individuals have only necessary access privileges. This comprehensive approach safeguards systems, applications, and data while aligning with operational needs.
- Devices users manage the service through
- Directly from any device which may also be used for normal business (for example web browsing or viewing external email)
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- Coalfire
- ISO/IEC 27001 accreditation date
- 06/04/2022
- What the ISO/IEC 27001 doesn’t cover
- N/A
- ISO 28000:2007 certification
- No
- CSA STAR certification
- Yes
- CSA STAR accreditation date
- 22/11/2023
- CSA STAR certification level
- Level 2: CSA STAR Attestation
- What the CSA STAR doesn’t cover
- N/a.
- PCI certification
- Yes
- Who accredited the PCI DSS certification
- Coalfire
- PCI DSS accreditation date
- 01/12/2023
- What the PCI DSS doesn’t cover
- N/A
- Cyber essentials
- No
- Cyber essentials plus
- No
- Other security certifications
- Yes
- Any other security certifications
-
- AWS
- SOC 2 - Type One
- SOC 2 - Type One
- ISO 9001
- ISO 27701
- NIST 800-200
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
-
- ISO/IEC 27001
- Other
- Other security governance standards
-
SOC 2 Type 2.
ISO27701.
ISO9001.
NIST 800-200. - Information security policies and processes
- Recorded Future's Information Security policies include (but are not limited to) - Information Classification, Handling, Appropriate Use, Encryption, Hardening, Patching/Updates, Vulnerability Management, Permitted/Prohibited OEMs, OS/Browsers, Traveling with Device, Passwords, MFA/Authentication, Administrator Accounts, On-/Off-Boarding, Destruction/Sanitization, Third-Party Vendors, Malware, Training, NDA, Removable Media, Temporary Files, IoT, Generic/Shared Accounts, Secure Coding, Physical Security, Clean Desk, InfoSec Awareness, Incident Response.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- Outlined in our Information Security whitepaper available at https://go.recordedfuture.com/hubfs/information-security-white-paper.pdf
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- For operating systems, we continuously monitor for vulnerabilities, and we apply corrective updates depending on severity. Critical within seven days and lower scheduled into our quarterly project/remediation process. Patches to applications to be deployed every week, including any critical, required patches. Lower priority goes into the planning of our quarterly non-critical patching.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- Outlined in our Information Security whitepaper available at https://go.recordedfuture.com/hubfs/information-security-white-paper.pdf
- Incident management type
- Supplier-defined controls
- Incident management approach
- Recorded Future's Incident Response Plan is available under NDA upon request.
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Separation between users
- Virtualisation technology used to keep applications and users sharing the same infrastructure apart
- Yes
- Who implements virtualisation
- Supplier
- Virtualisation technologies used
- Other
- Other virtualisation technology used
- We rely on AWS, and AWS security for our cloud hosting for more information see - https://aws.amazon.com/security/
- How shared infrastructure is kept separate
- This is part of our AWS infrastructure. We have one instance for all clients. Client data is encrypted and is separated from other clients via a database solution. Client data = any saved queries, alerts, reports, notes or lists. We can share our setup with AWS under NDA if required.
Energy efficiency
- Energy-efficient datacentres
- Yes
- Description of energy efficient datacentres
- N/A - Recorded Future do not operate any data centres, this is managed by AWS.
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Covid-19 recovery
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Fighting climate change
Recorded Future's mission is to secure our world with intelligence. Recorded Future believes that the failure to safeguard infrastructure and/or data can have egregious impacts on the wellbeing of individuals. As such, by using Recorded Future's Intelligence Cloud, customers are better able to safeguard their systems and data to prevent security incidents and better avoid injury to the wellbeing of their communities.Covid-19 recovery
Recorded Future's mission is to secure our world with intelligence. Recorded Future believes that the failure to safeguard infrastructure and/or data can have egregious impacts on the wellbeing of individuals. As such, by using Recorded Future's Intelligence Cloud, customers are better able to safeguard their systems and data to prevent security incidents and better avoid injury to the wellbeing of their communities.Tackling economic inequality
Recorded Future's mission is to secure our world with intelligence. Recorded Future believes that the failure to safeguard infrastructure and/or data can have egregious impacts on the wellbeing of individuals. As such, by using Recorded Future's Intelligence Cloud, customers are better able to safeguard their systems and data to prevent security incidents and better avoid injury to the wellbeing of their communities.Equal opportunity
Recorded Future's mission is to secure our world with intelligence. Recorded Future believes that the failure to safeguard infrastructure and/or data can have egregious impacts on the wellbeing of individuals. As such, by using Recorded Future's Intelligence Cloud, customers are better able to safeguard their systems and data to prevent security incidents and better avoid injury to the wellbeing of their communities.Wellbeing
Recorded Future's mission is to secure our world with intelligence. Recorded Future believes that the failure to safeguard infrastructure and/or data can have egregious impacts on the wellbeing of individuals. As such, by using Recorded Future's Intelligence Cloud, customers are better able to safeguard their systems and data to prevent security incidents and better avoid injury to the wellbeing of their communities.
Pricing
- Price
- £10,125 a user a year
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- Use mobile app, browser extension, integration trial, our free sandbox or asset discovery tools, to can gain free access to actionable intelligence. Utilise our free cyberthreat intelligence tools for security insights. Our free browser extension delivers real-time intelligence via risk scores and context on IP-addresses, domains, hashes, URLs, and CVEs.
- Link to free trial
- https://www.recordedfuture.com/free-products