|Headquarters||1142 Broadway, Suite 400 Tacoma, Washington 98402 United States|
|Lars Harvey (CEO), Rod Rasmussen (President and Chief Technology Officer)|
IID, previously Internet Identity, is a privately held Internet security company based in Tacoma, Washington, United States. It primarily provides cyberthreat data, a platform to exchange cyberthreat data, and anti-phishing, malware and domain control security services to US federal government agencies, financial service firms, and e-commerce, social networking and Internet Service Provider(ISP) companies. Microsoft uses IID as a data feed for its anti-phishing software as well as a partner in their Domain Defense Program. Other customers include BECU (Boeing Employees’ Credit Union), Monster.com and Yakima Valley Credit Union.
IID was founded in 1996 providing outsourced domain management services. In 1997, the company claims to have discovered and disabled one of the earliest phishing attacks. Since then, IID’s business has revolved around protecting companies against cyber attacks. In 2013, IID accepted its first round of institutional funding for $8 million from Bessemer Venture Partners.
Products and services
ActiveTrust is IID’s Threat Intelligence Management System. The company claims it gets threat data from thousands of sources, and determines what data is useful to defend against cyberattacks. ActiveTrust feeds this data into Fortune 500 companies’ and U.S. government agencies’ cybersecurity appliances, leading IID to claim that ActiveTrust is the world’s largest commercial cyberthreat data exchange.
Provides a list of the latest malicious (or compromised) IP addresses, domains and e-mail accounts, and identifies those "bad players" the organization is connected to through its extended enterprise. ActiveTrust Data was formerly known as “ActiveKnowledge.”
IID’s Threat Intelligence team investigates, analyzes and validates threat data to identify patterns and trends, revealing ongoing attacks and future hazards. The TI team takes shared data from ActiveTrust and uses filtering and analysis to add structure and context.
Detects, diagnoses and mitigates DNS (Domain Name System) security and configuration issues for an organization and its Extended Enterprise. This tool reportedly helped IID identify the DNS hijacking of Twitter in December 2009. It also reportedly helped find that half of all Fortune 500 companies were infected with DNSChanger.
Provides anti-phishing and malware security solutions that help organizations ensure that online brands are trusted. Mitigation was formerly known as "ActiveControl" and “Power Shark.”
IID holds leadership positions in various security industry groups including with the Anti-Phishing Working Group (APWG), Internet Corporation for Assigned Names and Numbers (ICANN) and Messaging Anti-Abuse Working Group (MAAWG).
- "Napster.com WHOIS, DNS, & Domain Info - DomainTools". Whois.domaintolls.com. Retrieved 4 January 2015.
- "Microsoft Enhances Phishing Protection for Windows, MSN and Microsoft Windows Live Customers". Microsoft News Center. November 17, 2005. Retrieved December 21, 2010.
- Chris Preimesberger (November 11, 2005). "Microsoft Expands Its Anti-Phishing Database". eWeek. Retrieved December 21, 2010.
- "Microsoft Launches Enforcement Campaign Targeting Web Site "Cybersquatters" Who Use Online Ads". Microsoft News Center. August 22, 2006. Retrieved December 21, 2010.
- Credit Union Times (October 6, 2010). "New Fraud Alert Network". Credit Union Times. Retrieved December 21, 2010.
- [dead link]
- Eric Blattberg (November 5, 2013). "IID accepts $8M, its first VC funding after 17 years, for security social network". VentureBeat. Retrieved March 19, 2015.
- William Jackson (February 11, 2014). "Social platform for sharing cyberthreat intell goes live". Government Computer News. Retrieved March 19, 2015.
- Jenna Wortham and Nick Bilton (December 18, 2009). "Web Attack on Twitter Is Third Assault This Year". New York Times. Retrieved December 21, 2010.
- Kelly Jackson Higgins (December 18, 2009). "Twitter Hit By DNS Hijacking Attack". Dark Reading. Retrieved December 21, 2010.
- Brian Krebs (February 2, 2012). "Half of Fortune 500s, US Govt. Still Infected with DNSChanger Trojan". Krebs On Security. Retrieved March 19, 2015.
- "Rod Rasmussen". Icannwiki.org. Retrieved 4 January 2015.