• slide

Overview

Recorded Future is the only provider offering threat intelligence software powered by patented machine learning and delivered at scale, combined with world-class intelligence services and cyber research expertise to help security professionals identify, prioritize, and quickly respond to relevant threats targeting their organization. Recorded Future is laser focused on delivering actionable threat intelligence while dramatically reducing the time-consuming manual processes of threat intelligence analysis. Delivered in a SaaS model for everywhere access and future-proofing against changing security requirements, Recorded Future software automates the collection of data across an unparalleled breadth of sources (open, deep, and dark web) and delivers relevant alerts in real time to dramatically improve operational efficiency and network defense.

Contracts


Federal

GSA Schedule 70

GS-35F-0119Y
Dec 20, 2011- Dec 19, 2021

SEWP V

NNG15SC03B/NNG15SC27B
May 01, 2015- Apr 30, 2025

ITES-SW

W52P1J-15-D-0008
Mar 03, 2015- Aug 10, 2020
*Additional Option Years Available

State and Local

CMAS

3-12-70-2247E
Aug 28, 2012- Mar 31, 2022

City of Seattle Contract

0000003265
Jul 11, 2014- Dec 19, 2021

Department of General Services PA - Symantec

4400004253
May 01, 2009- Dec 19, 2021

Fairfax County IT Hardware, Software, & Services

4400006323
Oct 04, 2015- Dec 04, 2021
*Additional Option Years Available

Orange County National IPA Co-Op

MA-017-16010236
Jun 01, 2015- May 31, 2021

Pennsylvania COSTARS-6 IT Software Contract

COSTARS-006-176
Aug 31, 2017- Aug 31, 2021

State of Indiana Contract

0000000000000000000021430
Aug 01, 2017- Jul 31, 2021

State of New Mexico Contract

80-000-18-00002
Aug 01, 2017- Aug 01, 2021

Education

Massachusetts Higher Education Consortium (MHEC)

MC15-04
Aug 10, 2019- Jun 30, 2022

The Quilt

MSA - 05012019F
Apr 01, 2016- Apr 30, 2022

VASCUPP

UVA1482501
May 02, 2014- Dec 19, 2021

Healthcare

Innovations in Health IT Modernization Gives Rise to Cybersecurity Challenges

Federal health agencies have adopted innovation as their roadmap to the future – embracing emerging technologies such as Internet of Things-enabled medical devices and interoperable electronic health records. While these technologies have enabled agencies to accelerate delivery and improve their front-line customer experience, a more connected health IT landscape also increases the cyber threat landscape and introduces new challenges for security professionals. Learn More...

Combating Healthcare Data Breaches with Intelligence

In this Expert Edition, Combating Healthcare Data Breaches with Intelligence, we review several agencies’ efforts to identify, treat and prevent the cyber issues inherent in electronic health records and medical devices. Here are just a few ways it’s practiced. Learn More...

Innovations in Health IT Modernization Give Rise to Cybersecurity Challenges

Federal health agencies have adopted innovation as their roadmap to the future — embracing emerging technologies such as the Internet of Things-enabled medical devices and interoperable electronic health records. While these technologies have enabled agencies to accelerate delivery and improve their front-line customer experience, a more connected health IT landscape also increases the cyber threat landscape and introduces new challenges for security professionals. Learn More...

Recorded Future for Government Healthcare

As healthcare organizations continue to grow their networks of interconnected partner organizations, systems, applications, and medical devices that share sensitive PII and PHI, it's no surprise cyber attackers are targeting them. Internal cyber security and external awareness are both critical to ensure patient care in uninterrupted and sensitive data is secured. Learn More...

Security Intelligence for Healthcare

As healthcare organizations grow their networks of connected medical devices and systems that share PII and PHI, it’s no surprise that cyber attackers are targeting them. Recorded Future positions real-time, automated security intelligence at the center of your security workflows — arming your teams with an unrivaled breadth of sources and empowering fast detection, decision making, and response. Learn More...

Healthcare Webinar

With Recorded Future intelligence integrated into ServiceNow, healthcare organizations can confidently automate workflows with knowledge from an unrivaled breadth of external sources. Accelerate threat detection, response, and decision making by positioning comprehensive, real-time intelligence at the center of your security workflows and processes. Learn More...

Geopolitical

Overcoming GEOINT Workforce Hurdles to Unlock the Power of Artificial Intelligence

We live in a world in which threats are constantly growing and morphing. Geospatial intelligence (GEOINT) links events to geography through visual depictions and deep analysis. This empowers leaders to understand what is happening, where it’s happening, and why it’s happening — so they can take decisive action to protect citizens. Learn More...

Geopolitics: An Overlooked Influencer in Cyber Operations

​The vast majority of cyberattacks are financially motivated, but not all cyberattacks are about money. While attacks by state-sponsored threat groups are certainly in the minority, they also can be far more dangerous than those perpetrated by petty criminals. Back in October 2018, we held our seventh annual Recorded Future User Network (RFUN) conference in Washington, D.C. During the conference, attendees were treated to a presentation on geopolitics and its influence on cyber operations by Jeannette Dickens-Hale and Danika Blessman, two senior threat intelligence analysts from NTT Security. Learn More...

Faster Decisions Through Automation

Our guest this week is Bob Stasio, global cyber threat leader at DuPont, a global Fortune 500 company with around 35,000 employees. Bob shares his professional pathway beginning in the U.S. Army, with stops along the way at NSA and U.S. Cyber Command, and at private sector companies like Bloomberg and IBM. In this episode, we get Bob’s take on threat intelligence and learn why he thinks automation is one of the key components to future success in securing organizations — both internally and online. Learn More...

Supercharge Your Security Intelligence: How to Build an Intelligence-Led Security Program (Allan and GovTech)

Today’s threat landscape can be overwhelming for state and local security analysts and their teams. Collecting and analyzing vast amounts of information on potential threats often leads to data overload. Agency silos make it harder to exchange vital intelligence insights. And most analysts don’t have the proper time or resources to manually investigate potential indicators of a cyberattack. That leaves them open to risk and can even make them unaware that they’ve been breached. Learn More...

Real-Time Threat Intelligence

Open source intelligence (OSINT) and associated metadata are increasingly imperative for a true multi-INT analytic capability. As the field evolves, activity-based intelligence (ABI) and its subsets rely upon critical elements of processing and using vast amounts of OSINT effectively. Learn More...

Chinese State Media Seeks to Influence International Perceptions of COVID-19 Pandemic

Over the course of 2019, we published research on Chinese English-language social media influence operations, revealed that they are seeded by state-run media, and that they generally present a positive, benign, and cooperative image of China. This research examines Chinese influence attempts during the novel coronavirus, known as the coronavirus disease 2019 (COVID-19) outbreak, and is an effort to characterize Chinese state-run media’s attempts to influence Western public perceptions of the pandemic. Learn More...

Events

News

Latest News

Recorded Future, the leading threat intelligence company, today announced that it has been approved to deliver critical cyber capabilities in support of the Department of Homeland Security's (DHS) ...
READ MORE >

Resources

Resources

Learn best practices, explore use cases, chart your course, and mature your security intelligence program. When you register, you’ll immediately unlock the entire Ultimate Security Intelligence Kit.

Solutions Brief

Recorded_Future_Logo.png
Solutions Brief
For years, security operations teams have relied on security information and event management (SIEM) technology to collect, correlate, and analyze security event logs from a variety of sources across their network environments. These tools were built to help them quickly detect and respond to threat...

As part of their cyber third-party risk management strategies, many organizations rely on governance, risk, and compliance (GRC) technology to consolidate risk information from internal sources and external sources to understand their vendor risk landscape. As vendor ecosystems grow in size and comp...

For years, security operations teams have relied on security information and event management (SIEM) technology to collect, correlate, and analyze security event logs from a variety of sources across their network environments. These tools were built to help them quickly detect and respond to threat...

Read this overview on SOAR solutions to learn how Recorded Future delivers more context than threat feeds, updates in real time so intelligence stays relevant, and integrates seamlessly with SOAR solutions to support four key use cases.

Video

Watch this short video to see what Recorded Future data looks like in a Splunk environment.

Are you drowning in daily security alerts and asking yourself what it all means? Because security operations, vulnerability management, and incident response teams need fast access to real-time context to make sense of all that data, we developed the Recorded Future Browser Extension to deliver acce...

Watch this short video to learn about the value of threat intelligence and Recorded Future for SOAR solutions.

Webinar

Today’s threat landscape can be overwhelming for state and local security analysts and their teams. Collecting and analyzing vast amounts of information on potential threats often leads to data overload. Agency silos make it harder to exchange vital intelligence insights. And most analysts don’t...

Recorded Future and Verterim discuss how we’ve collaborated to bring threat intelligence into GRC and third-party processes to better identify and manage risk.Watch this GRC webinar and discover ways to advance third-party risk maturity with threat intelligence.