Internet Identity
Encyclopedia
For other uses, see Internet identity
Internet identity
Internet identity may refer to:* Online identity - personal self-concept as it relates to the Internet * Digital identity -...


Internet Identity, currently referred to as IID, is a privately held Internet security
Internet security
Internet security is a branch of computer security specifically related to the Internet. Its objective is to establish rules and measures to use against attacks over the Internet. The Internet represents an insecure channel for exchanging information leading to a high risk of intrusion or fraud,...

 company based in Tacoma, Washington
Tacoma, Washington
Tacoma is a mid-sized urban port city and the county seat of Pierce County, Washington, United States. The city is on Washington's Puget Sound, southwest of Seattle, northeast of the state capital, Olympia, and northwest of Mount Rainier National Park. The population was 198,397, according to...

. It primarily provides anti-phishing
Phishing
Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details by masquerading as a trustworthy entity in an electronic communication. Communications purporting to be from popular social web sites, auction sites, online payment processors or IT...

, malware
Malware
Malware, short for malicious software, consists of programming that is designed to disrupt or deny operation, gather information that leads to loss of privacy or exploitation, or gain unauthorized access to system resources, or that otherwise exhibits abusive behavior...

 and domain control security services to financial service firms, e-commerce, social network
Social network
A social network is a social structure made up of individuals called "nodes", which are tied by one or more specific types of interdependency, such as friendship, kinship, common interest, financial exchange, dislike, sexual relationships, or relationships of beliefs, knowledge or prestige.Social...

ing and Internet Service Provider
Internet service provider
An Internet service provider is a company that provides access to the Internet. Access ISPs directly connect customers to the Internet using copper wires, wireless or fiber-optic connections. Hosting ISPs lease server space for smaller businesses and host other people servers...

(ISP) companies. Microsoft
Microsoft
Microsoft Corporation is an American public multinational corporation headquartered in Redmond, Washington, USA that develops, manufactures, licenses, and supports a wide range of products and services predominantly related to computing through its various product divisions...

 uses IID as a data feed for its anti-phishing software
as well as a partner in their Domain Defense Program. Other publicly-mentioned customers include BECU
BECU
BECU is a credit union originally established to serve employees of The Boeing Company. BECU was founded as Fellowship Credit Union in 1935 by 18 Boeing employees, and was named Boeing Employees' Credit Union for much of its history...

 (Boeing Employees’ Credit Union), Monster.com
Monster.com
Monster.com is one of the largest employment websites in the world, owned and operated by Monster Worldwide, Inc. Monster is one of the 20 most visited websites out of 100 million worldwide, according to comScore Media Metrics...

 and Yakima Valley Credit Union.

History

IID was founded in 1996 providing outsourced domain management services. In 1997, the company began securing Internet presence for enterprises when it claims to have discovered and disabled one of the earliest phishing attacks. Since then, IID’s business has revolved around protecting companies against cyber attacks.

ActiveSecure

ActiveSecure is a suite of security solutions designed to secure a company’s Internet presence management
Internet presence management
Internet Presence Management is the process of controlling the Web presence, or Internet-based channels of an organization or company, with the goal of increasing that entity's online presence and overall internet efficiency.-Internet presence:...

. Its solutions include ActiveTrust DNS, ActiveControl and ActiveKnowledge. Altogether, the suite provides protection against a variety of Internet threats, including phishing
Phishing
Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details by masquerading as a trustworthy entity in an electronic communication. Communications purporting to be from popular social web sites, auction sites, online payment processors or IT...

, malware
Malware
Malware, short for malicious software, consists of programming that is designed to disrupt or deny operation, gather information that leads to loss of privacy or exploitation, or gain unauthorized access to system resources, or that otherwise exhibits abusive behavior...

 attacks and Domain Name System
Domain name system
The Domain Name System is a hierarchical distributed naming system for computers, services, or any resource connected to the Internet or a private network. It associates various information with domain names assigned to each of the participating entities...

 (DNS) hijackings.

ActiveTrust DNS

Detects, diagnoses and mitigates DNS (Domain Name System) security and configuration issues for an organization and its Extended Enterprise
Extended Enterprise
An extended enterprise is a loosely coupled, self-organizing network of firms that combine their economic output to provide products and services offerings to the market...

. This tool reportedly helped IID identify the DNS hijacking
DNS hijacking
DNS hijacking or DNS redirection is the practice of redirecting the resolution of Domain Name System names to other DNS servers. This is done for malicious purposes such as phishing; for self-serving purposes by Internet service providers to direct users' HTTP traffic via the ISP's own webservers...

 of Twitter
Twitter
Twitter is an online social networking and microblogging service that enables its users to send and read text-based posts of up to 140 characters, informally known as "tweets".Twitter was created in March 2006 by Jack Dorsey and launched that July...

 in December, 2009

ActiveControl

Provides anti-phishing and malware security solutions that help organizations ensure that online brands are trusted. ActiveControl was formerly known as “Power Shark.”

ActiveKnowledge

Provides a list of the latest malicious (or compromised) IP address
IP address
An Internet Protocol address is a numerical label assigned to each device participating in a computer network that uses the Internet Protocol for communication. An IP address serves two principal functions: host or network interface identification and location addressing...

es, domains and e-mail
E-mail
Electronic mail, commonly known as email or e-mail, is a method of exchanging digital messages from an author to one or more recipients. Modern email operates across the Internet or other computer networks. Some early email systems required that the author and the recipient both be online at the...

 accounts, and specifically identifies those "bad players" the organization is connected to through its extended enterprise.

Industry Partnerships

IID holds leadership positions in various security industry groups including with the Anti-Phishing Working Group
Anti-Phishing Working Group
The Anti-Phishing Working Group is an international consortium that brings together businesses affected by phishing attacks, security products and services companies, law enforcement agencies, government agencies, trade association, regional international treaty organizations and communications...

(APWG), Internet Corporation for Assigned Names and Numbers(ICANN) and Messaging Anti-Abuse Working Group (MAAWG).

External links

The source of this article is wikipedia, the free encyclopedia.  The text of this article is licensed under the GFDL.
 
x
OK