Real-time cyber threat sharing: new platform from ServiceNow

    This year, ServiceNow introduced the cloud platform Trusted Security Circles. It helps combat cyber threats through the exchange of information between companies and security professionals. / Flickr / wikimedia commons / cc



    How Trusted Security Circles Works


    With the new release of Jakarta, the ServiceNow platform offered enterprises the ability to share and receive relevant threat information in real time. Typically, in the fight against cyber attacks, the security officers of individual companies were left face to face with the threat, but now they can request data from suppliers and partners. With Trusted Security Circles, organizations control how and with whom they share their data.

    Information about cyber threats is often not distributed further than the affected company due to possible reputation losses. Not all enterprises are willing to acknowledge security vulnerabilities, so Trusted Security Circles allows you to share information anonymously. As explainedServiceNow user Suzanne Smith, in privacy mode, companies can choose to receive threat information from colleagues in a specific industry or based on location. In this way peculiar “circles of awareness” are formed.

    When a security team sees suspicious activity on its network, it can generate a request within a specific community. If the number of such requests exceeds the set threshold, the incident is automatically redirected to ServiceNow Security Operations, an internal threat response service, which can speed up the response.

    Thus, the new technology allows ServiceNow user organizations to keep abreast of upcoming attacks and arm themselves with the necessary information from colleagues.

    Vice President ServiceNow Sean Convery (Sean Convery) in August said that the main tool of cyber security is a unified platform that includes integration with third-party security services. According to Sean, ServiceNow currently has 40 suppliers who, among other things, generate useful information for users. It is at the heart of Trusted Security Circles.

    / The Flickr / frankieleon / CC

    Information Exchange Solutions - A Well-established Trend


    In addition to ServiceNow, certain solutions in the same area were previously offered by both private companies and government departments. For example, in 2015, IBM announced the launch of its IBM X-Force Exchange platform based on IBM Cloud. This solution provides access to IBM datasets and third-party threat information. The system works on the basis of certain indicators of cyber attacks in real time.

    The Center for Exchange and Analysis of Information in the Financial Sector from NC4 operates on a similar principle . The National Bank of the Republic of Belarus intends to implement a similar initiative to combat computer attacks based on the exchange of information about threats. Canada also operatesown non-profit organization for the voluntary exchange of information. The US, UK and Hong Kong authorities are encouraging and calling for automated threat reporting at the legislative level .

    As noted by the head of IT security at Cubic Corp. Adam Rice, the main obstacle to sharing information is trust between competitors and market partners. In his opinion, the process should guarantee the reliability of the information provided about the threats, incidents should be accessible for verification, and the identity of each member of the information exchange community should also be established.

    In this case, we can talk about trust and, therefore, about a mutually beneficial environment. By and large, the ServiceNow platform acts as the verifier that makes the exchange of information efficient.

    PS Additional reading on the topic in our corporate blog:


    Also popular now: