What is an Associate Member?

RH-ISAC Associate Members are industry-leading providers committed to adding value within the RH-ISAC community and the activities it supports, understanding industry challenges, and supporting member companies. RH-ISAC works with Associate Members to provide RH-ISAC Core Members discounts to programs and services. Associate Members provide many benefits to RH-ISAC members including:
Two women and a man are engaged in conversation at a business conference.
360 Privacy logo

Free one-year subscription for one executive

RH-ISAC members get an exclusive 12-month membership for one (1) executive at our flagship 360 Enterprise tiered offering. This includes the removal of Personally Identifiable Information from 400+ public data broker websites, Monthly Deletion Reporting, and Optional Decoy data deployment.360 Privacy’s mission is to protect the digital identity, security, and reputation of high-profile executives, athletes, and high net-worth families. Digital identity is at the intersection of physical security, cyber, fraud prevention, and reputation. Powered by proprietary technology and an expert team, 360 Privacy correlates, analyzes, and deletes data daily to protect your digital identity, keeping it out of the hands of sophisticated threat actors, fraudsters, and other criminals.

To redeem, email the individuals below with the subject line “RH-ISAC Exclusive Offer: 360 Privacy”

Allure Security Logo

Free online brand protection monitoring

RH-ISAC members are eligible for free online brand protection monitoring from Allure Security.

  • Get alerted to websites impersonating your brand amongst more than 100 million sites examined daily
  • View potentially malicious URLs, domains, and indicators that match your brand
  • Sample the value of Allure Security online brand protection with a free account
Armis

10% off the Armis Centrix Platform

As part of Armis’ commitment to the RH-ISAC community, we are offering an exclusive 10% off of the Armis Centrix Platform for members. Armis Centrix™, is the cyber exposure management platform that protects the entire attack surface and manages an organization’s cyber risk exposure in real time.

A Comprehensive, Modular Approach

  • Armis Centrix™ for Asset Management and Security: Complete inventory of all asset types to see and secure your attack surface
  • Armis Centrix™ for OT/ IoT Security: See and secure OT networks and physical assets, ensure uptime, and build an effective and comprehensive security strategy
  • Armis Centrix™ for Vulnerability Prioritization and Remediation: See, consolidate, prioritize, and remediate all vulnerabilities

To redeem this offer, please email [email protected] and reference “10% Discount off the Armis Centrix Platform for RH-ISAC Community Members”.

Calypso AI

Threats & Opportunity LLM Briefing 

As part of CalypsoAI’s commitment to the RH-ISAC community, we’re offering an exclusive and complimentary Threats & Opportunity briefing for members of the RH-ISAC community. These briefings are meticulously crafted to provide a comprehensive snapshot of the latest threats and opportunities within Generative AI. Our LLM briefings encourage a collaborative environment by fostering strategic discussions and knowledge sharing. By equipping professionals with timely, relevant, and actionable information, we aim to empower the collective resilience of our cybersecurity community against increasingly sophisticated cyber and AI threats.

To redeem, email [email protected] with the subject line “RH-ISAC Exclusive Offer: ”Threats & Opportunity briefing.”

Flashpoint

Flashpoint is committed to leading the way in providing value to all Core Members — and to strengthening our partnership during these uncertain times. In this vein, Flashpoint is offering a complimentary, risk-free offer for RH-ISAC members to receive 90-day access to the Flashpoint Intelligence Platform and all associated finished intelligence, data, analytic dashboards and collections. The trial also includes access to compromised credential monitoring and targeted customer support throughout. Flashpoint will also turn on access to Partner Integrations and API as needed for organizations to better implement within their existing environments.

Free access for up to two users to the Flashpoint Intelligence Platform for 90-days.

Save up to 50% off on Challenge when combined with Pentest.

Penetration testing engagements satisfy compliance obligations, but to find the most elusive vulnerabilities, organizations also need continuous adversarial feedback for their critical applications. That’s where the HackerOne Pentest and Challenge solution comes in.

  • HackerOne Pentest-as-a-Service finds high or critical vulnerabilities in about 20% of engagements vs. traditional pentests that find few, if any.
  • A HackerOne Challenge is essentially a time-bound Bug Bounty, with a separate set of select vulnerability hunters incentivized to find the risks that even highly skilled pentesters were not able to find.

Elevate adversarial security testing by combining HackerOne Pentest for penetration testing as a service (PTaaS) with HackerOne Challenge for vulnerability hunting.

Other discounting options are available if either Challenge or Pentest alone better suits your needs.

Intel 471

Intel 471’s Vulnerability Intelligence provides contextual insight beyond what is being exploited in the wild based on known attacks and open source information. To help organizations stay ahead, Intel 471 provides the precursors that often take place before attacks. This enables their clients a more proactive approach by being informed on increased interest levels amongst threat actors, proof-of-concept (POC) code being developed, traded or sold, and ultimately knowing when weaponization and productization of the code is being integrated into exploit kits, exploit packs or other tools. 

Intel 471’s Vulnerability Intelligence delivers this capability via a regularly updated dashboard that tracks the life cycle of significant vulnerabilities observed in the underground – from initial disclosure to exploit weaponization and productization. Vulnerability Intelligence offers an analyst-driven assessment of priority vulnerabilities beyond volumetric keyword hits, which just isn’t adequate in today’s world. 

Exclusive pricing for Intel 471’s Vulnerability Intelligence.

Level 6

Free 30-Day Trial + 20% Off LISN Membership

 

RH-ISAC members can get a head start on their journey to AI-powered, data-driven cyber strategies with full access to the LISN analytic tool suite during a free 30-day trial. We’re also excited to offer RH-ISAC members an exclusive 20% discount on the annual LISN membership fee upon sign-up.

The LISN analytic tool suite uses the power of artificial intelligence to analyze what statistically works and fails in cybersecurity, delivering detailed answers to the most pressing information security questions every organization faces. These answers are based on cybersecurity ROI calculations from real-world data, giving cybersecurity decision-makers actionable guidance on what security strategies to employ for maximum organizational benefit.

Kasada

As an RH-ISAC ‘Associate Member’, Kasada is committed to providing the most effective and easiest to use bot mitigation service, while educating organizations on the automated threats impacting eCommerce organizations today.

We offer a free instant Bot Threat Report for the site of your choosing. This report provides an initial assessment on how effective your site is at detecting and stopping modern bot attacks that evade detection from most systems.

In addition, for qualified RH-ISAC members, we offer an in-depth free 30-day proof-of-concept (POC) implemented in 30 minutes to monitor and assess your website bot traffic.

Free instant Bot Threat Report for the site of your choice.


Free 30-day POC to monitor and assess your website bot traffic.

Red Sift

Free Security Posture Analysis & POC Trial

RH-ISAC members can get a completely free Red Sift Security Posture Report that covers:

  • Attack Surface Management – continuous and automatic identification of configuration issues, including deep configuration and prioritization data to speed remediation
  • Certificate monitoring – including issuance and expiration, configuration information to identify current certificates and causes of invalidation. We also find and monitor 3rd party certificates.
  • Domain impersonation – Insight into malicious activity for key domains, words, and logos.
  • Email security – Understand your email domain security setup and any vulnerabilities to exact domain impersonation which is used in phishing attacks.

After reviewing their report, RH-ISAC members have access to free POC trials on any of the Red Sift solutions. An active ISAC membership and commitment to a 45-minute meeting to review the report with the Red Sift team. A free POC requires the member’s involvement to build a requirements plan covering objectives, participants, and timelines before beginning the POC.

Free 30-day trial of the RiskRecon portal to see the security ratings of up to 50 vendors


Get free access to the RiskRecon portal and see the security ratings of up to 50 vendors of your choice. You’ll receive access security ratings for up to 50 vendors in your ecosystem, a RiskRecon report of your own organization, risk prioritized security findings via RiskRecon’s unique Risk Priority Matrix, and a quick start guide to assist with your on-boarding and full access to our expert Solutions Consulting team.

Security Scorecard

1-year complimentary SecurityScorecard Enterprise License to monitor your company and up to 5 other companies

SecurityScorecard scores and monitors over 12 million companies using an A to F grade scale that correlates with breach risk (F Companies are 7.7X more likely to be breached than A Companies). The platform can score and monitor the external cybersecurity posture of any organization using non-intrusive methods and show it how to improve via actionable detail.

You and your team can leverage SecurityScorecard for a variety of use-cases that include, vendor risk management, enterprise monitoring, board reporting, M&A and regulatory compliance.

SpyCloud Logo

Get a free 2-month lookback of your domain’s stolen web session cookies

Session hijacking (or trusted user fraud) is one of the hardest forms of fraud to detect. It starts with a malware-stolen cookie for a still-active session, and it ends with a criminal impersonating your customer without setting off any red flags on your end.

SpyCloud is working with consumer-facing businesses to identify malware-infected users who are at risk of account takeover fraud due to session hijacking. With early warning of stolen cookies, security teams can invalidate compromised sessions, protect their customers’ accounts, and protect the company’s bottom line

 

Stairwell

Free Access to the Stairwell Platform

Safely share and analyze malware samples across the RH-ISAC community with the Stairwell platform.

Upload your malware samples to the Stairwell platform, analyze them at the binary level, find potential variants within our global dataset, and share your findings and files across the RH-ISAC membership to create a safer, more informed community. This offer is only available to current RH-ISAC members.

 

Complimentary Advanced Continual Threat Hunt

Trustwave is a cyber-only focused company that hunts threats and stops threats all day every day. Trustwave can detect what others can’t enabling us to respond quickly and protect our clients from the devastating impact of cyberattacks. RH-ISAC members can register for one complimentary Advanced Continual Threat Hunt. Number of hunts are limited and available on a first come, first served basis. Only one hunt per customer request. Customer must have an EDR that we support.

 

xeol logo

Free 30-Day Trial

Xeol closes the end-of-life gap in your vulnerability management program.

  1. Continuously monitor for EOL from commercial software to open source projects.
  2. Proactively manage the riskiest EOL issues because their vulnerabilities cannot be patched.
  3. Protect your PCI environments with security policies that gate risky EOL dependencies.

As part of our commitment to the RH-ISAC community, we are offering a 30-day trial of Xeol. Sign up with your corporate email, and we will grant you access to Xeol. See your full EOL posture in 5 minutes.

 

Yubico logo

A trusted partner to strengthen your authentication security & strategy

Yubico provides retail and hospitality organizations peace of mind to protect against modern phishing attacks and account takeovers with the YubiKey—a security key that is the gold standard in phishing-resistant multi-factor authentication (MFA) and passwordless logins. As an RH-ISAC core member, you receive exclusive access to an infographic and white paper that showcase how the YubiKey can help you secure your organization without a rip or replace, and offer best-in-class customer experiences.
  • Not all forms of MFA are created equal in terms of usability and security, but the YubiKey balances both, delivering highest-assurance security with the best user experience.
  • With the YubiKey, you accelerate your Zero Trust strategy, ensuring that your critical and sensitive company and customer data always stays protected.
  • YubiKeys are simple to integrate into existing environments with multi-protocol support for both legacy and modern infrastructures, helping you bridge to modern passwordless authentication.
Meet with us to learn how you can get started with YubiKeys to strengthen your authentication posture, accelerate Zero Trust, and adopt modern passwordless authentication: yubi.co/contact