INTELLIGENT CLOUD
A screenshot of ServiceNow’s Trusted Security Circles.
ServiceNow launches
Trusted Security Circles
Now security analysts are
no longer alone in the war
against cyber threats says
Sean Convery, General
Manager, Security Business
Unit, ServiceNow.
S
erviceNow has announced Trusted
Security Circles, a new cloud-based
application that gives enterprises the
ability to share and receive hyper-relevant
threat intelligence in near real-time.
Security teams have been fighting
threats in isolation. Sharing information
about threats would expose to the world
that they were under attack. Now, security
teams can ask trusted peers, suppliers and
partners about threats and how dangerous
they are. Organisations can control the
way they share, what they share and with
whom they share, including being fully
anonymous. Enterprises can be forewarned
of targeted attacks and can contribute to
the safety of the community. In addition to
Trusted Security Circles, ServiceNow has
announced Vendor Risk Management.
On average, bad actors took about a
month to exploit a vulnerability, with half
of all first exploitation attempts having
occurred within a period of between 10
and 100 days. Since attackers often use the
same exploits against multiple targets in
an industry or community, sharing threat
intelligence with peers could give others
lead time to thwart similar attacks in their
own networks.
Securely and anonymously sharing
active threat data with trusted peers has
simply not been possible. Now, security
analysts are no longer alone. ServiceNow
enables enterprises to apply the power of
33