Streamline & Optimize

Internet Intelligence*

Use out-of-the-box threat intelligence options, as well as integration with third party data feeds to footprint the Internet, helping your teams make better informed decisions.

Flexible Workflows

Make risk-based decisions about vendors, partners, and your supply chain by monitoring third party network elements for changes in associated threat intelligence.

*STIX/TAXII 2.0 Compliant

STIX (Structured Threat Information Expression) is a language for describing cyber threat information so that it can be analyzed and/or exchanged. STIX makes it possible to explicitly characterize a cyber adversary’s motivations, capabilities, and activities, and in doing so, determine how to best defend against them. TAXII (Trusted Automated Exchange of Indicator Information) defines services and message exchanges that enable organizations to share the information they choose with the partners they choose.

Set the Score

Leverage LookingGlass’ proprietary Threat Indicator Confidence (TIC) scoring to find relevant threats faster and reduce alert fatigue.

With automated TIC scoring you can:

  • Score the entire Internet and all associated intelligence
  • Create a visual representation of network elements
  • Rank threats based on your organization’s environment, threat landscape, and security posture
  • Rate sources, classification, and criticality of intelligence and ultimately see how that rolls up across the global Internet

Ways to Use ScoutPrime

Information Security Operations

Security Operations Centers can perform more granular monitoring on network elements, and receive notifications of changes in risk to threat intelligence. This enables them to take appropriate actions in a more timely manner.

Third Party
Risk Analysis

Make risk-based decisions about vendors, partners, and your supply chain by monitoring third party network elements for changes in associated threat intelligence.

Manage Intelligence.