Vorstack Relaunches as BrightPoint Security

BrightPoint Security is introducing a platform called Sentinel, which offers granular policies for controlled threat intelligence sharing.

brightpoint and it security

Vorstack announced it is re-launching as BrightPoint Security, a new company with a new executive team.

The company’s Sentinel product is a platform with granular policies for controlled threat intelligence sharing across vendor supply chains, affiliates or subsidiaries.

"BrightPoint reflects the value that we deliver for our customers. As a name it signifies a guiding light, a pointer, or marker. Bright has meaning both in light and intelligence," Rich Reybok, chief technology officer at BrightPoint, told eWEEK. "We deliver actionable threat intelligence in minutes by reducing the noise inherent in threat data, and enabling secure information sharing with granular security policy controls."

Reybok said the company felt it was important to focus on a more positive name.

"BrightPoint Security is so much more than a threat feed. It makes your threat feeds effective and your security investments more valuable," he said.

Trusted Circles allow organizations to share threat intelligence with peer groups, as each organization that establishes a Trusted Circle has control over who joins and determines what level of policy controls are in place for each circle.

"We offer a spectrum of sharing that provides for full anonymity through full disclosure, Reybok said. “The only data that is shared between organizations are the indicators of compromise (IOCs) and the frequency of occurrence among the member organizations," he explained. "We like to think our sharing model will provide for security professionals what LinkedIn has provided for business professionals. You control who sees your information and what information they see. You decide what groups you want to join and your level of participation."

Sentinel’s enhancements include richer threat context for an organization’s cyber security intelligence operations centers. These include threat actor data to identify who is related to attack patterns, geo-location of attacks, search and indicator tagging, and analytics and scoring of incidents for weighting and prioritization.

"The most significant challenge that we hear from our customers is that they are overwhelmed with threat data from a variety of sources, and it is difficult to identify threats that are directly impacting their organization, Reybok said. “Our experience is that by automating the correlation of threat intelligence in a customer’s environment and presenting them with information to evaluate their risk, we have freed up time so existing staff can move to incident investigation more quickly and with better information."