Flexible Access to
Security Intelligence

Recorded Future is a modular solution designed for customization and adaptability to meet each client’s unique needs. With four distinct user licenses and an a-la-carte selection of valuable add-ons, you can access Recorded Future’s unprecedented security intelligence at the exact level that is right for your organization.


License Levels

Start by selecting the level of access to security intelligence that your organization needs.

Browser Extension Security Intelligence Platform Access
Express Express Plus Core Advanced

Browser extension to quickly prioritize IOCs on any webpage

Full browser extension for prioritization and detailed investigation of alerts, incidents, IOCs, and vulnerabilities

Access to the world’s most advanced Security Intelligence Platform to amplify workflow efficiency and real-time threat detection

Comprehensive access to the world’s most advanced Security Intelligence Platform to accelerate cyber risk evaluation and action

Prioritize IOCs and Vulnerabilities

  • Risk score
  • Top risk rule

Includes everything in Express, and:

All Risk Rules

  • Access to all risk indicators for IOCs and vulnerabilities

Risk Evidence

  • See the evidence and sources behind every risk rule

Includes everything in Express Plus, and:

Insikt Group Analysis

  • Elite, human-curated research on the latest threats

Brand-Focused Alerts

  • Brand mentions
  • Credential leaks
  • Typosquat detection

Company-Focused Alerts

  • Infrastructure alerts
  • Vulnerabilities in tech stack

Industry Threat Trends

  • Tailored alerts based on your industry

Mobile App

  • Monitor alerts and view research from anywhere

Includes everything in Core, and:

In-depth Investigations

  • APT/nation-state threat actor research
  • Dark web criminal research
  • Cached access to dark web forums and underground markets
  • Cached access to paste sites and code sharing sites
  • Malware file analysis
  • Reported breach, exposure, and incident analysis
  • Vulnerability exploit POC and malcode in the wild research
  • Malware family and adversary TTP research

Hunting Packages

  • SNORT/YARA rules

Advanced Custom Analysis

  • Fully customizable alerts
  • Compound queries
  • Interactive data visualizations

Industry-Leading Analysis

  • Ransomware monitoring
  • ICS/SCADA malware detection
  • Merchant / POS defense
  • Banking and payments protection
  • Cyber espionage monitoring
  • Exploit kit tracking
Express Express Plus Core Advanced

Free

$10,000/user

Learn more about Core

Learn more about Advanced

Browser Extension
Express Express Plus

Browser extension to quickly prioritize IOCs on any webpage

Full browser extension for prioritization and detailed investigation of alerts, incidents, IOCs, and vulnerabilities

Prioritize IOCs and Vulnerabilities

  • Risk score
  • Top risk rule

Includes everything in Express, and:

All Risk Rules

  • Access to all risk indicators for IOCs and vulnerabilities

Risk Evidence

  • See the evidence and sources behind every risk rule

Free

$10,000/user

Security Intelligence Platform Access
Core Advanced

Access to the world’s most advanced Security Intelligence Platform to amplify workflow efficiency and real-time threat detection

Comprehensive access to the world’s most advanced Security Intelligence Platform to accelerate cyber risk evaluation and action

Includes everything in Express Plus, and:

Insikt Group Analysis

  • Elite, human-curated research on the latest threats

Brand-Focused Alerts

  • Brand mentions
  • Credential leaks
  • Typosquat detection

Company-Focused Alerts

  • Infrastructure alerts
  • Vulnerabilities in tech stack

Industry Threat Trends

  • Tailored alerts based on your industry

Mobile App

  • Monitor alerts and view research from anywhere

Includes everything in Core, and:

In-depth Investigations

  • APT/nation-state threat actor research
  • Dark web criminal research
  • Cached access to dark web forums and underground markets
  • Cached access to paste sites and code sharing sites
  • Malware file analysis
  • Reported breach, exposure, and incident analysis
  • Vulnerability exploit POC and malcode in the wild research
  • Malware family and adversary TTP research

Hunting Packages

  • SNORT/YARA rules

Advanced Custom Analysis

  • Fully customizable alerts
  • Compound queries
  • Interactive data visualizations

Industry-Leading Analysis

  • Ransomware monitoring
  • ICS/SCADA malware detection
  • Merchant / POS defense
  • Banking and payments protection
  • Cyber espionage monitoring
  • Exploit kit tracking

Learn more about
Core

Learn more about
Advanced

Valuable Add-On Options

Select additional modules to integrate security intelligence into your organization’s environment and address specific use cases.

Connect Integration

Integrate intelligence into SIEM, SOAR, ticketing, incident response, and more.

LEARN MORE

Third-Party Risk

Continuously monitor the cybersecurity risk of your third-party ecosystem.

LEARN MORE

Analyst on Demand Services

Deep-dive analysis on a particular topic requested by the client.

LEARN MORE

Fusion

Integrate internal and proprietary threat intelligence.

LEARN MORE

Takedown Services

Take down fraudulent domains and social media accounts directly from the platform.

LEARN MORE

Managed Services

Dedicated intelligence experts to alleviate resource constraints and manage your alerts after-hours.

LEARN MORE

Get Started

We arm more than 40,000 security professionals across 22 industries and six continents with threat intelligence to reduce their cyber risk. Get started with real-time intelligence today.