ServiceNow has announced Trusted Security Circles, a new cloud-based application that gives enterprises the ability to share and receive hyper-relevant threat intelligence in near real-time.ServiceNow has also announced the availability of Vendor Risk Management, a new cloud-based application enterprises can use to automate third party risk, onboard new vendors more quickly and gain visibility of their overall risk posture.
“Securely and anonymously sharing active threat data with trusted peers has simply not been possible,” said Sean Convery, General Manager, Security Business Unit, ServiceNow. “Now, security analysts are no longer alone. ServiceNow enables enterprises to apply the power of collaboration to proactively avert attacks.”
With Trusted Security Circles, a security team may see suspicious activity in their network and will want to know if others in their defined community have also seen it. An anonymous query goes to other members of the chosen circle, and a sightings search is performed against the specified suspicious observables. Customers now know if a security incident they’re investigating is happening to any peers, partners or suppliers. If the number of sightings exceeds a set threshold, a security incident can be automatically opened in ServiceNow Security Operations. This serves as an early warning system for industry-specific, targeted attacks, can speed up response and shore up an entire supply chain from attacks.
With Vendor Risk Management, organizations can now automate the third party risk management process, ensuring quality and effectiveness of assessment controls. They can onboard new vendors much more quickly, allowing them to get value from their vendors more quickly. And finally, when combined with a broader risk management program, an organization can get a complete view of their overall risk and a systematic way to take action to reduce it.