What is an Associate Member?

RH-ISAC Associate Members are industry-leading providers committed to adding value within the RH-ISAC community and the activities it supports, understanding industry challenges, and supporting member companies. RH-ISAC works with Associate Members to provide RH-ISAC Core Members discounts to programs and services. Associate Members provide many benefits to RH-ISAC members including:
Two women and a man are engaged in conversation at a business conference.
360 Privacy logo

RH-ISAC members get an exclusive 12-month membership for one (1) executive at our flagship 360 Enterprise tiered offering. This includes the removal of Personally Identifiable Information from 400+ public data broker websites, Monthly Deletion Reporting, and Optional Decoy data deployment.360 Privacy’s mission is to protect the digital identity, security, and reputation of high-profile executives, athletes, and high net-worth families. Digital identity is at the intersection of physical security, cyber, fraud prevention, and reputation. Powered by proprietary technology and an expert team, 360 Privacy correlates, analyzes, and deletes data daily to protect your digital identity, keeping it out of the hands of sophisticated threat actors, fraudsters, and other criminals.

To redeem, email the individuals below with the subject line “RH-ISAC Exclusive Offer: 360 Privacy”

 

Free one-year subscription for one executive

Cybrary

Check out and sign up for the latest list of courses, including one to prep for a CISSP certification. Want to learn more about unlocking team talent? If you like what you see, Cybrary is offering all RH-ISAC Core Members a free 60-day trial license and a 15% discount on the Cybrary for Team Business subscription! 

Free 60-day trial license and a 15% discount 

Data Dome logo

Free 30-day Trial

Start a free 30-day trial and see which sophisticated threats are reaching your website, mobile app, and APIs across all transaction points—from login to product listings to payment.

  • Identify gaps in your security.
  • Get alerts when you are under attack.
  • Explore detailed reporting and real-time analytics.
  • Compare your bot traffic against industry benchmarks.

You’ll get a full assessment and actionable recommendations from our industry-recognized threat research and SOC team experts.

Start your 30-day free trial – no credit card, no commitment, deploy easily on any web infrastructure:

f5 logo

Free Bot Business Impact Assessment 

As an RH-ISAC member, you know all too well the importance of safeguarding your e-commerce business from attacks such as malicious bots. To help you discover the true business impact of bots on your business and how to explain the impact in business terms your C-Suite and Boards will understand, F5 is offering RH-ISAC members a free Bot Business Impact Assessment Consultation, along with a free white paper: From Bots to Boardroom: How Bad Bots Negatively Impact Your Business.

Protect your customers—and your bottom line with F5.
Access your free Bot Business Impact Assessment today!

F5 is a multi-cloud application security and delivery company that enables customers to bring extraordinary digital experiences to life. F5’s portfolio of automation, security, performance, and insight capabilities empowers many of the world’s largest enterprises, financial institutions, merchants, service providers, and governments to create, secure, and operate adaptive applications that reduce costs, improve operations, and better protect users.

Flare logo

10 identifiers free for 1 year + 20% Discount on a Full License

 

Each RH-ISAC member will be able to redeem 10 identifiers for 1 year, completely free (max 3 top-level domain identifiers). In addition, RH-ISAC Members who upgrade to a full Flare license will be given a 20% discount on their first year, and 15% discount for subsequent years.What’s an identifier? Our identifiers are search terms used in the platform such as your domain name, the names of key VIPs in your organization, maybe internal project names or other terms that you want us to search and then we take our red team experience within the system and augment your terms with hundreds of other terms. Name, email, domain, IP Address, and company name are some identifier examples.

Flashpoint

As the RH-ISAC ‘Associate Member of the Year’ for 2017 and 2019, Flashpoint is committed to leading the way in providing value to all Core Members — and to strengthening our partnership during these uncertain times. In this vein, Flashpoint is offering a complimentary, risk-free offer for RH-ISAC members to receive 90-day access to the Flashpoint Intelligence Platform and all associated finished intelligence, data, analytic dashboards and collections. The trial also includes access to compromised credential monitoring and targeted customer support throughout. Flashpoint will also turn-on access to Partner Integrations and API as needed for organizations to better implement within their existing environments.

Free access for up to two users to the Flashpoint Intelligence Platform for 90-days.

Fortinet

RH-ISAC Core Members receive access to the Fortinet Developer Network (FNDN). FNDN is the source for official API documentation for Fortinet products. There are helpful tools and scripts for developing custom and innovative solutions. The Fortinet Developer Network also allows our customers and Fortinet professionals to interact with one another, get help with API-related questions, share example code, and upload their own tools. A Fortinet Developer Network subscription is the best way to get started on your next big project. 

Free access to the Fortinet Developer Network (FNDN).

HackerOne offers a diverse portfolio of products based on an organization’s security requirements and posture, attack surface and ability to remediate vulnerabilities in a timely manner.

Advisory Plus is offered in conjunction with HackerOne Response Enterprise edition, a highly configurable solution for sophisticated organizations to establish a compliant vulnerability assessment process for receiving and acting on vulnerabilities discovered by third-parties. The combination of HackerOne Response and Advisory Plus provides a white-glove experience with proactive support, customizable workflows, and proven best practices to successfully launch, manage and scale your security program from end-to-end.

Exclusive offer to take advantage of a reframed version of HackerOne Response, including 3 months of Advisory Plus Services.

Intel 471

Intel 471’s Vulnerability Intelligence provides contextual insight beyond what is being exploited in the wild based on known attacks and open source information. To help organizations stay ahead, Intel 471 provides the precursors that often take place before attacks. This enables their clients a more proactive approach by being informed on increased interest levels amongst threat actors, proof-of-concept (POC) code being developed, traded or sold, and ultimately knowing when weaponization and productization of the code is being integrated into exploit kits, exploit packs or other tools. 

Intel 471’s Vulnerability Intelligence delivers this capability via a regularly updated dashboard that tracks the life cycle of significant vulnerabilities observed in the underground – from initial disclosure to exploit weaponization and productization. Vulnerability Intelligence offers an analyst-driven assessment of priority vulnerabilities beyond volumetric keyword hits, which just isn’t adequate in today’s world. 

Exclusive pricing for Intel 471’s Vulnerability Intelligence.

Level 6

Extended Access to the LISN Early Adopter Program + 60% OFF first year of LISN access

 

RH-ISAC members that join the LISN Early Adopter Program receive access to LISN beta through May 2023, as well as full access to LISN v1.0 from the end of the program through December 31, 2023, all for 60% off the standard LISN membership fee. A two-year contract is required at signing and can be canceled at any time.

The LISN analytic tool suite uses the power of artificial intelligence to analyze what statistically works and fails in cybersecurity, delivering detailed answers to the most pressing information security questions every organization faces. These answers are based on cybersecurity ROI calculations from real-world data, giving cybersecurity decision-makers actionable guidance on what security strategies to employ for maximum organizational benefit.

Kasada

As an RH-ISAC ‘Associate Member’, Kasada is committed to providing the most effective and easiest to use bot mitigation service, while educating organizations on the automated threats impacting eCommerce organizations today.

We offer a free instant Bot Threat Report for the site of your choosing. This report provides an initial assessment on how effective your site is at detecting and stopping modern bot attacks that evade detection from most systems.

In addition, for qualified RH-ISAC members, we offer an in-depth free 30-day proof-of-concept (POC) implemented in 30 minutes to monitor and assess your website bot traffic.

Free instant Bot Threat Report for the site of your choice.


Free 30-day POC to monitor and assess your website bot traffic.

HUMAN

HUMAN supports RH-ISAC members by helping them assess their automated fraud risk. Our team of security experts will share insights from recent bot trends and provide tailored recommendations based on the member company’s unique business. Get this exclusive offer for free!

HUMAN safeguards e-commerce businesses from sophisticated bot attacks, fraud, and account abuse. Powered by the Human Defense Platform, our award-winning application protection solutions mitigate digital attacks while preserving customer experience and data integrity. We leverage a modern defense strategy—comprising visibility, network effect, and disruptions—to reduce risk, protect revenue, and increase operational efficiency. HUMAN verifies the humanity of more than 20 trillion interactions per week across 3 billion devices worldwide, giving us unmatched visibility into fraud across the internet.

Free 30-day trial of the RiskRecon portal to see the security ratings of up to 50 vendors


Get free access to the RiskRecon portal and see the security ratings of up to 50 vendors of your choice. You’ll receive access security ratings for up to 50 vendors in your ecosystem, a RiskRecon report of your own organization, risk prioritized security findings via RiskRecon’s unique Risk Priority Matrix, and a quick start guide to assist with your on-boarding and full access to our expert Solutions Consulting team.

Security Scorecard

Complimentary SecurityScorecard Enterprise License to monitor your company and up to 5 other companies

 

SecurityScorecard scores and monitors over 12 million companies using an A to F grade scale that correlates with breach risk (F Companies are 7.7X more likely to be breached than A Companies). The platform can score and monitor the external cybersecurity posture of any organization using non-intrusive methods and show it how to improve via actionable detail. 

You and your team can leverage SecurityScorecard for a variety of use-cases that include, vendor risk management, enterprise monitoring, board reporting, M&A and regulatory compliance.

SpyCloud Logo

SpyCloud Session Identity Protection delivers early warning to companies whose consumers are victims of active malware infections. Take action on stolen cookies that enable criminals to bypass MFA and fraud controls. By invalidating the associated web sessions, you protect your consumers and your bottom line from hard-to-detect fraud. To learn more about this product, visit spycloud.com. To take advantage of this offer, contact [email protected].

 

Free 2-month look-back of compromised web session cookies from SpyCloud for new customers.

Transunion TLOxp® is the ideal tool to conduct robust manual reviews and investigations that aid in the detection and prevention of fraud. TransUnion is proud to be one of the nation’s leading providers of risk and information solutions. Through the combination of TransUnion’s extensive data and analytics, with the data fusion capabilities of TLOxp®, Transunion brings even deeper insights to the challenges customers face. TLOxp is the latest generation of the technology that originated the science of data fusion. Built on an architecture of supercomputers running proprietary linking and assessment algorithms, TLOxp filters through a massive repository of public and proprietary data almost instantly. When you search with TLOxp, you receive detailed reports filled with actionable data in seconds. 

Try TLOxp today and get 14-days free and 10% off. TransUnion will also waive the onsite visit fee (a $60 value).

For more details, visit here

Try TLOxp today and get 14-days free and 10% off. TransUnion will also waive the onsite visit fee (a $60 value).

TruStar

TruSTAR is an Intelligence Management Platform that helps you operationalize data across tools and teams, helping you prioritize investigations and accelerate incidence response. From streamlined workflow integrations, secure access control, advanced search, and the ability to automate data ingestion and normalization, TruSTAR ensures you get the right intelligence when you need it.

This new feature takes the heavy lifting out of the sorting and prioritization of user-reported suspicious emails. Emails go into TruSTAR on one side, all the threat data being pulled in is normalized and scored, and then those emails are categorized into a high, medium, or low priority score. This allows teams to focus on what’s really important and operate efficiently. 

Free 60-day trial of the TruSTAR Phishing Triage solution.