<meter id="72aef"></meter>
    <listing id="72aef"><object id="72aef"></object></listing>
  1. <output id="72aef"></output>
    <code id="72aef"></code>

    <output id="72aef"></output>

  2. <listing id="72aef"><delect id="72aef"><s id="72aef"></s></delect></listing>
    <small id="72aef"></small>

    <small id="72aef"></small>

    Press Release

    DomainTools Iris Now Offers Collaboration Features for Improved Teamwork and Investigation Sharing

    Cybersecurity Research Team Led by Black Hat Review Board Member Kyle Wilhoit to Demo Shared Investigations in Iris Platform at Booth #160 at Black Hat USA 2017

    Las Vegas – July 24, 2017 DomainTools, the leader in domain name and DNS-based cyber threat intelligence, today unveiled new collaboration capabilities of Iris, a proprietary threat intelligence and investigative platform used by security teams to triage threat indicators, assess risk, and help mitigate future attacks. DomainTools’ senior security researcher and Black Hat review board member Kyle Wilhoit will be in attendance at Black Hat USA 2017 to showcase new Iris features including shared investigations, investigation notes, and exportable investigation reports. Through interactive demos at booth #160, event attendees will get a glimpse into how these new features enable collaboration among security teams and improve the ability of security analysts to annotate their investigations and deliver curated PDF outputs to external parties.

    To receive a personal demo of Iris (bring your own IPs or domains!) and learn more about additional new features planned for 2017, schedule a meeting with DomainTools at the conference here: http://www.1081377.com/black-hat-2017.

    The new capabilities within Iris encourages users to collaborate with the help of easier, more targeted, and efficient methods. Through shared investigations, security teams can work together in real-time to leverage individual strengths and experience levels within the group. Additionally, the tool’s new notes component allows users to document their rationale and insight at any investigation node/pivot and have this commentary accessible to anyone in the collective team. The addition of exportable investigation reports enables users to share customizable information via printable, PDF-format outputs easily shareable in soft or hard copy to interested parties.

    “As a security researcher myself, I understand the importance of collaboration and information sharing through all stages of an investigation. With the shared investigations tool within Iris, security teams can work cohesively in real time to expose actor infrastructure and make decisions to better protect their networks,” said Wilhoit. “We’re looking forward to demonstrating these abilities at Black Hat, a place where infosec collaboration is encouraged and revered.”

    Black Hat Conference 2017

    • What: DomainTools Iris demonstration
    • Who: Kyle Wilhoit, Senior Security Researcher
    • Where: Booth #160, Mandalay Bay Convention Center, Las Vegas
    • When: July 26-27, 2017

    About DomainTools

    DomainTools helps security analysts turn threat data into threat intelligence. We take indicators from your network, including domains and IPs, and connect them with nearly every active domain on the Internet. Those connections inform risk assessments, help profile attackers, guide online fraud investigations, and map cyber activity to attacker infrastructure. Fortune 1000 companies, global government agencies, and leading security solution vendors use the DomainTools platform as a critical ingredient in their threat investigation and mitigation work. Learn more about how to connect the dots on malicious activity at http://www.1081377.com or follow us on Twitter:@domaintools

    新疆时时彩投注平台

      <meter id="72aef"></meter>
      <listing id="72aef"><object id="72aef"></object></listing>
    1. <output id="72aef"></output>
      <code id="72aef"></code>

      <output id="72aef"></output>

    2. <listing id="72aef"><delect id="72aef"><s id="72aef"></s></delect></listing>
      <small id="72aef"></small>

      <small id="72aef"></small>

        <meter id="72aef"></meter>
        <listing id="72aef"><object id="72aef"></object></listing>
      1. <output id="72aef"></output>
        <code id="72aef"></code>

        <output id="72aef"></output>

      2. <listing id="72aef"><delect id="72aef"><s id="72aef"></s></delect></listing>
        <small id="72aef"></small>

        <small id="72aef"></small>

        电玩街机捕鱼游戏合集 安卓捕鸟达人变态版 幸运飞艇等一名遗漏统计 福建时时11选五结果查询今天 赛车pk10稳赢计划 福建36选7走势图 山东时时彩开奖结果走势图 微信棋牌透视怎么弄的 福建体彩31选7159期开奖结果 新时时几点结束