Security Services

iDefense® Security Intelligence

Verisign iDefense gives security and risk management professionals relevant, timely and actionable security intelligence, enabling businesses and governments to make smarter decisions to defend against new and evolving threats.

Request a Quote

Verisign iDefense® Services

Protecting valuable assets against cyberthreats with timely distribution of actionable intelligence to drive informed decisions.

iDefense understands that today’s executives, security practitioners and cyber intelligence analysts require trusted cyber intelligence to investigate threats, take actions and transition to an intelligence-driven security paradigm with confidence. For over 17 years, Verisign iDefense Security Intelligence Services has established a proven track record of providing timely, relevant and actionable cyber threat intelligence to the largest organizations in the world. Equally notable is iDefense’s role as the security intelligence provider for Verisign, helping keep .com and .net critical DNS infrastructure secure and 100 percent available.


Improve IT expenditure and resource allocation decisions

Detect, analyze and mitigate attacks

Investigate, prioritize and remediate incidents and workflow

Increase your security team’s capability and productivity

Evolve existing tools with better visibility

Secure high-value assets and programs from advance threats

iDefense Key Capabilities

100+ Security Researchers Worldwide

Proficiency in 20+ Languages

More Than 40 Threat Intelligence Analysts

Dedicated Subject Matter Experts in:

Malware Reverse Engineering & Countermeasure Creation

Vulnerability Discovery & Mitigations

Threat Actor Tactics, Techniques & Procedures

Intelligence Analysis Tradecraft & Collection

Service Coverage Areas

Cyber Espionage

iDefense provides threat intelligence that enables organizations to enhance their early-warning capabilities to proactively identify cyber espionage activity. By identifying threat actors before they can establish a strong foothold within an organization, companies can reduce the likelihood and severity of these high-impact incidents and help protect their intellectual property and reputation. In-depth analysis of individual attack campaigns and their associated infrastructure, motivations, tactics, techniques and procedures (TTPs) enables tactical response teams to identify and contain a discovered threat.


iDefense tracks cyber espionage campaigns emanating from many geographic regions, providing customers with in-depth research around cyber espionage actors’ TTPs. Leveraging our vast repository of over 126 million malware samples (and currently growing at 3 million samples per month), iDefense analysts can provide customers with additional understanding of malware identified within their environment through analysis of the malware sample and correlation to samples within our malware repository. From there, iDefense can build out a larger picture of the attackers and provide organizations with potential courses of action, including the use of indicators of compromise with which to identify additional infections.


Before launching an attack, attackers must set up the necessary infrastructure to support their actions. iDefense identifies patterns in domain registrations, IP addresses and attack correlation to discover these assets before they are used. For example, in one case iDefense customers were able to proactively block command-and-control (C&C) servers before attacks could be launched by identifying hundreds of domains matching a *yui[a-z] pattern that were registered to just a few email addresses and were used by multiple espionage intrusion sets. This infrastructure was subsequently used in a zero-day Microsoft Internet Explorer 8 attack several months later.

Cyber Crime

As cybercrime becomes more organized and professional, security teams are finding it increasingly hard to keep up with the evolution of cyber criminal activity and methods. From protecting financial resources and assets to customers’ personally identifiable information (PII), the challenges of crafting effective defenses depends greatly on actionable intelligence.


iDefense helps organizations defend themselves by understanding how attackers generate income from crimeware and by providing customers with detailed intelligence on the malicious actors, tools and tactics involved. iDefense cybercrime analysts reverse engineer malware to identify organizations targeted by the attacker, to evaluate the effectiveness of the malware, and to determine the best way to mitigate an attack. iDefense has deep expertise and sophisticated technologies to help identify and mitigate the risk of fraud for customers engaging in any sort of financial transaction.


iDefense sent an Indications & Warnings report to an insurance customer regarding a detected leak of PII. The customer requested additional information on the malicious actors involved, including associations and presences in numerous underground forums. iDefense was able to trace the threat actor activity across multiple forums and delivered additional contextual information while helping the customer continuously monitor the malicious activity and identify the source of the leak.


Hacktivist groups are taking up cyber arms against those whom they perceive to be responsible or complicit in causes they care about, whether driven by ideology, nationalism or the desire for notoriety. Hacktivists can achieve their goals via website defacements, denial of service attacks, social engineering, disclosure of sensitive information or by spreading propaganda on compromised platforms. Experienced hacktivist groups may focus their efforts on capturing credentials to compromise social media platforms and domain name system (DNS) records for major news, government and corporate entities.


By understanding threats in context, iDefense is able to provide customers with advance warning of threats. iDefense generates qualified threat assessments to confirm the threat credibility posed by the latest malicious operations, to identify key actors involved, to reveal actors’ preferred TTPs, to notify customers of emerging threats and possible future attacks, and to alert clients of any proprietary data found “dumped” in underground forums.


A set of hacktivist actors declared an operation against perceived corruption, leading an iDefense client to ask: “How credible is this threat?” By understanding threats in context, iDefense identified the key actors who played a critical role as well as their preferred TTPs. This enabled iDefense to provide the client with confirmation of the threat’s credibility, identification of key actor involvement, advanced warning of probable tactics, and alerts for possible future attacks.

Vulnerability Management

Vulnerability Management is about prioritizing patches and mitigating threats targeting known and unknown vulnerabilities. Vulnerabilities previously unknown to a software vendor are called zero-day vulnerabilities, so-called because no time has been given for patch development. Understanding the intricate relationships between vulnerabilities, exploits, adversaries and their associated TTPs can be a daunting challenge for even the most seasoned information security and risk management professional.


The iDefense Vulnerability Management team researches, collects and analyzes relevant and critical software vulnerabilities in more than 45,000 products from over 700 technology vendors, regularly providing deep and rigorous analysis of software vulnerabilities more than 100 days before public disclosure. Zero-day vulnerabilities are discovered by our in-house lab and by leveraging a network of over 100 worldwide security research contributors through the iDefense Vulnerability Contributor Program (VCP). In-house vulnerability discovery is typically accomplished via source code audits and fuzz testing. iDefense also leverages a unique and extensive data set derived from Verisign’s Managed DNS Services infrastructure and DDoS Protection Services, which further enhances vulnerability discovery.


iDefense provides vulnerability intelligence that informs customers how to prioritize software patches based on each vulnerability’s criticality. For example, a customer once asked: “Regarding MS12-020 (CVE-2012-0002), is Windows® 2000 vulnerable? Should we patch?” In response, iDefense ran a publicly available proof-of-concept code against Windows® 2000 and confirmed that it was indeed vulnerable. iDefense then notified the customer that the workarounds provided by Microsoft® also worked on Windows® 2000.

Request a Free Trial

Talk with an iDefense security services expert to learn more about our free trial offer.


iDefense empowers people and machines to make timely and intelligent security decisions critical to protecting their business.

iDefense IntelGraph

iDefense’s next-generation threat intelligence platform is built on graph database technology that allows all facets of threat intelligence (actors, malware, exploits, targets, vulnerabilities, etc.) to be stored in a central repository interconnected by links that provide rich context to all the content. This innovative technology significantly enhances the ability to detect and analyze threats while accelerating customer notification and remediation actions.

iDefense IntelGraph provides the industry with the most comprehensive database of threat intelligence data collected from over 17 years of operation, combining technical, operational and human intelligence with Verisign’s proprietary data gleaned from the operation of critical Internet infrastructure.


The newly developed application offers:

  • Rich search features, including contextual navigation
  • Visualization of relationships between actors; known infrastructure; tactics, techniques and procedures (TTPs); and other discrete threat elements
  • Data-driven reporting functionality
  • Ad hoc research flows, allowing security analysts and incident responders to “pivot” from a known data point and further explore the relationships inherent in the threat intelligence data
  • Customized content delivery and alerting
  • RESTful API access for seamless integration into existing technology platforms


Evolve your existing security tools and devices and provide them with better visibility and context through automated integration of iDefense threat intelligence.

  • Complete RESTful API providing full programmatic access to all IntelGraph content

Industry Solutions



Tactics used by adversaries to target financial institutions are rapidly evolving. Financial institutions are further challenged with safeguarding their data and securing their assets with the advent of new payment systems (e.g., mobile) and the changing regulatory and compliance landscape, which requires effective processes for:

Incident Response

Enterprise Risk Management

Business Continuity and Disaster Recovery

iDefense’s value proposition to the financial industry:

  • Complete RESTful API providing full programmatic access to all IntelGraph content
  • Understand the likelihood of being attacked - understanding today’s threats and vulnerabilities helps you better align resources and respond faster
  • Protect your critical technology assets - knowing your adversaries’ tactics and techniques helps you prepare countermeasures and know where and when to invest

iDefense helps financial institutions make smarter security decisions that balance the needs of asset protection, compliance and optimal resource allocation.



The ever-growing digital world creates more complexity for retailers to manage the risks faced by their supply chain and payment systems. Retailers must protect customer data confidentiality, safeguard payments against fraud and secure their supply chain from disruptions, requiring them to keep pace with a constantly changing and persistent threat environment.

iDefense can help you by:

  • Building intelligence into your operations to defend against threats
  • Identifying emerging threats and possible future attacks relevant to payment systems
  • Understanding the global implications of any emerging or existing threat as it evolves

Request a Free Quote

Speak with an iDefense security services expert to request a quote.

Why Partner With iDefense?

iDefense is a pioneer of the threat intelligence industry and the longest-standing pure-play commercial threat intelligence provider in the market. We leverage an extensive intelligence-gathering network, proven methodology and highly skilled professionals to deliver comprehensive, actionable intelligence that helps organizations make smarter, faster decisions. Partnering with iDefense empowers your customers with sophisticated cybersecurity intelligence that strengthens their security posture.

When you partner with iDefense, you will have access to technologies that can greatly improve your revenue and profitability while satisfying your customers’ requirement for a leading threat intelligence solution. Benefit from:

  • Growth opportunities in the cybersecurity marketplace
  • Impactful sales and marketing resources
  • Strong margin opportunities
  • An expanding team

OEM Partners

Technology integration partners leverage iDefense’s powerful API to enhance their existing products and services with valuable cyber threat intelligence data, providing customers with greater insight and resilience against the rapidly evolving threat landscape.


Resellers play an integral role in helping customers improve their business’s security and risk management capabilities with high-fidelity cyber threat intelligence data. Organizations are empowered by iDefense’s critical decision support intelligence to make smarter assessments about optimizing security expenditures and operations, enhancing protection of core assets, and navigating the complex regulatory environment.

Service Providers

Whether you provide Security Operations Center services to your customers or you offer incident response and investigation services, iDefense provides a deeper and broader level of insight into global threats and vulnerabilities far beyond most organizations’ in-house intelligence collection and analysis capabilities. Strengthen your customers’ cybersecurity posture with powerful, actionable and relevant threat intelligence delivered in context to support critical decision-making needs.

System Integrators

As a system integrator, your customers’ security is of paramount importance in maintaining the integrity and reliability of all deployments. iDefense provides threat intelligence that directly integrates into existing hardware and software solutions to provide rich contextual insight into malicious actors’ tactics, techniques and procedures. Deploying iDefense mitigates the risk of cyber attacks and enables a strong defense against targeted intrusion attempts by criminals, espionage actors and hacktivist, thereby improving IT asset resiliency, reliability and availability.


Access the Verisign iDefense 2016 Cyberthreats and Trends Report.