• slide

Overview

Recorded Future is the only provider offering threat intelligence software powered by patented machine learning and delivered at scale, combined with world-class intelligence services and cyber research expertise to help security professionals identify, prioritize, and quickly respond to relevant threats targeting their organization. Recorded Future is laser focused on delivering actionable threat intelligence while dramatically reducing the time-consuming manual processes of threat intelligence analysis. Delivered in a SaaS model for everywhere access and future-proofing against changing security requirements, Recorded Future software automates the collection of data across an unparalleled breadth of sources (open, deep, and dark web) and delivers relevant alerts in real time to dramatically improve operational efficiency and network defense.

Contracts


Federal

GSA Schedule 70

GS-35F-0119Y
Dec 20, 2011- Dec 19, 2021

SEWP V

NNG15SC03B/NNG15SC27B
May 01, 2015- Apr 30, 2025

ITES-SW

W52P1J-15-D-0008
Mar 03, 2015- Aug 10, 2020
*Additional Option Years Available

State and Local

CMAS

3-12-70-2247E
Aug 28, 2012- Mar 31, 2022

City of Seattle Contract

0000003265
Jul 11, 2014- Dec 19, 2021

Department of General Services PA - Symantec

4400004253
May 01, 2009- Dec 19, 2021

Fairfax County IT Hardware, Software, & Services

4400006323
Oct 04, 2015- Dec 04, 2021
*Additional Option Years Available

Orange County National IPA Co-Op

MA-017-16010236
Jun 01, 2015- May 31, 2021

Pennsylvania COSTARS-6 IT Software Contract

COSTARS-006-176
Aug 31, 2017- Aug 31, 2021

State of Indiana Contract

0000000000000000000021430
Aug 01, 2017- Jul 31, 2021

State of New Mexico Contract

80-000-18-00002
Aug 01, 2017- Aug 01, 2021

Education

Massachusetts Higher Education Consortium (MHEC)

MC15-04
Aug 10, 2019- Jun 30, 2022

The Quilt

MSA - 05012019F
Apr 01, 2016- Apr 30, 2022

VASCUPP

UVA1482501
May 02, 2014- Dec 19, 2021

Healthcare

Innovations in Health IT Modernization Gives Rise to Cybersecurity Challenges

Federal health agencies have adopted innovation as their roadmap to the future – embracing emerging technologies such as Internet of Things-enabled medical devices and interoperable electronic health records. While these technologies have enabled agencies to accelerate delivery and improve their front-line customer experience, a more connected health IT landscape also increases the cyber threat landscape and introduces new challenges for security professionals. Learn More...

Combating Healthcare Data Breaches with Intelligence

In this Expert Edition, Combating Healthcare Data Breaches with Intelligence, we review several agencies’ efforts to identify, treat and prevent the cyber issues inherent in electronic health records and medical devices. Here are just a few ways it’s practiced. Learn More...

Innovations in Health IT Modernization Give Rise to Cybersecurity Challenges

Federal health agencies have adopted innovation as their roadmap to the future — embracing emerging technologies such as the Internet of Things-enabled medical devices and interoperable electronic health records. While these technologies have enabled agencies to accelerate delivery and improve their front-line customer experience, a more connected health IT landscape also increases the cyber threat landscape and introduces new challenges for security professionals. Learn More...

Recorded Future for Government Healthcare

As healthcare organizations continue to grow their networks of interconnected partner organizations, systems, applications, and medical devices that share sensitive PII and PHI, it's no surprise cyber attackers are targeting them. Internal cyber security and external awareness are both critical to ensure patient care in uninterrupted and sensitive data is secured. Learn More...

Security Intelligence for Healthcare

As healthcare organizations grow their networks of connected medical devices and systems that share PII and PHI, it’s no surprise that cyber attackers are targeting them. Recorded Future positions real-time, automated security intelligence at the center of your security workflows — arming your teams with an unrivaled breadth of sources and empowering fast detection, decision making, and response. Learn More...

Healthcare Webinar

With Recorded Future intelligence integrated into ServiceNow, healthcare organizations can confidently automate workflows with knowledge from an unrivaled breadth of external sources. Accelerate threat detection, response, and decision making by positioning comprehensive, real-time intelligence at the center of your security workflows and processes. Learn More...

Geopolitical

Overcoming GEOINT Workforce Hurdles to Unlock the Power of Artificial Intelligence

We live in a world in which threats are constantly growing and morphing. Geospatial intelligence (GEOINT) links events to geography through visual depictions and deep analysis. This empowers leaders to understand what is happening, where it’s happening, and why it’s happening — so they can take decisive action to protect citizens. Learn More...

Geopolitics: An Overlooked Influencer in Cyber Operations

​The vast majority of cyberattacks are financially motivated, but not all cyberattacks are about money. While attacks by state-sponsored threat groups are certainly in the minority, they also can be far more dangerous than those perpetrated by petty criminals. Back in October 2018, we held our seventh annual Recorded Future User Network (RFUN) conference in Washington, D.C. During the conference, attendees were treated to a presentation on geopolitics and its influence on cyber operations by Jeannette Dickens-Hale and Danika Blessman, two senior threat intelligence analysts from NTT Security. Learn More...

Faster Decisions Through Automation

Our guest this week is Bob Stasio, global cyber threat leader at DuPont, a global Fortune 500 company with around 35,000 employees. Bob shares his professional pathway beginning in the U.S. Army, with stops along the way at NSA and U.S. Cyber Command, and at private sector companies like Bloomberg and IBM. In this episode, we get Bob’s take on threat intelligence and learn why he thinks automation is one of the key components to future success in securing organizations — both internally and online. Learn More...

Supercharge Your Security Intelligence: How to Build an Intelligence-Led Security Program (Allan and GovTech)

Today’s threat landscape can be overwhelming for state and local security analysts and their teams. Collecting and analyzing vast amounts of information on potential threats often leads to data overload. Agency silos make it harder to exchange vital intelligence insights. And most analysts don’t have the proper time or resources to manually investigate potential indicators of a cyberattack. That leaves them open to risk and can even make them unaware that they’ve been breached. Learn More...

Real-Time Threat Intelligence

Open source intelligence (OSINT) and associated metadata are increasingly imperative for a true multi-INT analytic capability. As the field evolves, activity-based intelligence (ABI) and its subsets rely upon critical elements of processing and using vast amounts of OSINT effectively. Learn More...

Chinese State Media Seeks to Influence International Perceptions of COVID-19 Pandemic

Over the course of 2019, we published research on Chinese English-language social media influence operations, revealed that they are seeded by state-run media, and that they generally present a positive, benign, and cooperative image of China. This research examines Chinese influence attempts during the novel coronavirus, known as the coronavirus disease 2019 (COVID-19) outbreak, and is an effort to characterize Chinese state-run media’s attempts to influence Western public perceptions of the pandemic. Learn More...

Events

News

Latest News

Recorded Future, the leading threat intelligence company, today announced that it has been approved to deliver critical cyber capabilities in support of the Department of Homeland Security's (DHS) ...
READ MORE >

Resources

Datasheet

Recorded Future + HPEArcSight SIEM Use CasesBy using Recorded Future, SOC teams typically improve efficiency, detection, and threat prioritization through several use cases:

Get rich web context on IP addresses, domains, and hashes via Recorded Future Intel CardsAutomatically correlate susp...

Every day, government organizations are blindsided by cyber attacks, and analysts risk missing the threats that truly impact their organizations. As threats increase in volume and intensity, the Web has become the new battleground where they emerge, fester, and ultimately target governments worldwid...

Phishing campaigns, intellectual property leaks, and fraudulent sites aimed at stealing credentials all pose risks to your brand. Download the datasheet to learn how Recorded Future can help your organization with these challenges.

Download the datasheet and learn how Recorded Future's comprehensive third-party risk data helps threat intelligence teams understand, analyze, and address potential risks associated with third parties.

Download the datasheet to learn how Recorded Future rapidly identifies and prioritizes the vulnerabilities that matter.

Recorded Future delivers an expansive threat intelligence and OSINT platform that can proactively support IC efforts to counter traditional adversaries, violent extremist groups, and other actors in the physical and cyber domains.

The CDM program is the vehicle designed to provide agencies with real capabilities and tools to monitor vulnerabilities and threats to their network in near real-time to lower the risk from cyber threats.

Splunk Phantom allows customers to work smarter, respond faster, and strengthen their defenses through automation and orchestration. Phantom playbooks enable customers to create customized, repeatable security workflows that can be automated. The following examples are automated playbooks leveraging...

E-Book

In this Expert Edition, Combating Healthcare Data Breaches with Intelligence, we review several agencies’ efforts to identify, treat and prevent the cyber issues inherent in electronic health records and medical devices. Here are just a few ways it’s practiced.

Having access to lots of security data — alerts, vulnerability scan data, suspicious files — is great, but how do you know where to focus first? That’s where threat intelligence comes in. The Recorded Future® BrowserExtension makes threat intelligence accessible from any web browser, whether ...