Intelligent Tech Channels Issue 10 | Page 33

INTELLIGENT CLOUD A screenshot of ServiceNow’s Trusted Security Circles. ServiceNow launches Trusted Security Circles Now security analysts are no longer alone in the war against cyber threats says Sean Convery, General Manager, Security Business Unit, ServiceNow. S erviceNow has announced Trusted Security Circles, a new cloud-based application that gives enterprises the ability to share and receive hyper-relevant threat intelligence in near real-time. Security teams have been fighting threats in isolation. Sharing information about threats would expose to the world that they were under attack. Now, security teams can ask trusted peers, suppliers and partners about threats and how dangerous they are. Organisations can control the way they share, what they share and with whom they share, including being fully anonymous. Enterprises can be forewarned of targeted attacks and can contribute to the safety of the community. In addition to Trusted Security Circles, ServiceNow has announced Vendor Risk Management. On average, bad actors took about a month to exploit a vulnerability, with half of all first exploitation attempts having occurred within a period of between 10 and 100 days. Since attackers often use the same exploits against multiple targets in an industry or community, sharing threat intelligence with peers could give others lead time to thwart similar attacks in their own networks. Securely and anonymously sharing active threat data with trusted peers has simply not been possible. Now, security analysts are no longer alone. ServiceNow enables enterprises to apply the power of 33