Cybersecurity at Relativity

Staying one step ahead

With the average cost of a data breach ringing in at around US$5 million, there’s no room for error in today’s relentless threat landscape. Relativity’s cybersecurity team is built around proactive defense to give you peace of mind.

Relativity Security: Secure by default - Illustration

Proactive Processes

Relativity Security: Threat Modeling - Icon

Threat Modeling

Our threat modeling procedures help us plan for attacks and determine how to slow them down, or better yet: prevent them altogether. We refine our models continuously – so as attackers get savvier, we stay one step ahead.

Relativity Security: Zero-Trust Architecture - Icon

Zero-Trust Architecture

Call us skeptics, but before we trust, we need to verify. We continuously validate every stage of digital interaction, providing layers of protection within our organization and resulting in even higher levels of security for our customers.

Relativity Security: Defense in (Greater) Depth - Icon

Defense in (Greater) Depth

Defense in depth means security controls at every layer – and we take that a few steps deeper with advanced security programs and tools.

  • Next-generation and web application firewalls to defend our perimeter and stop attackers in their tracks
  • Real-time detection of defects, compliance misconfigurations, and attacks
  • Inline network security groups that define strict permissions and system accessibility
  • Real-time scanning endpoint detections and response

Proactive Intelligence

Relativity Security: Multiple Sources of Intelligence - Icon

Multiple Sources of Intelligence

Our cyber detection and automation teams use multiple threat intelligence sources – from Recorded Future, Microsoft Threat Intelligence, and communities such as IT-ISAC – to give us even more confidence in everyday cyber decision making.

Relativity Security: Protecting Customers by Name - Icon

Protecting Customers by Name

We’re constantly on the lookout to protect not just Relativity’s brand, but our customers’ brands as well. We proactively monitor our threat intelligence platforms for mentions of our customers, and immediately inform anyone who pops up.

Relativity Security: Serving the Community - Icon

Serving the Community

Our free-to-use threat intelligence platform continuously monitors more than 200 intelligence data feeds – with new data pouring in constantly. The platform provides real-time access to actionable insights, alerts, and expert analysis.

Relativity Security: Dark Web Analysis - Icon

Dark Web Analysis

We scour Tor sites, hacker forums, paste sites, and anywhere else a hacker might lurk for suspicious behavior, breach indicators, and credential dumps. Keeping an eye on the dark web helps us learn from cybercriminals, keep up with evolving threats, and act in real time.

Relativity Security: Internal Threat Analysis - Icon

Internal Threat Analysis

Threats don’t only come from the outside in, so we keep a close profile on the behaviors and activities of our own community to protect against insider threats and ensure our intellectual property is always secure.

Relativity Security: Strong Connections - Icon

Strong Connections

We work with other tech platforms and their expert communities – such as Azure Security Center, Recorded Future, Anomali, and Signal Sciences – to gain early intel into the spaces where threat actors communicate, plan, and execute cyber activities.

Proactive Alliances

Calder7 is part of a network of cybersecurity professionals, and we regularly share events and indicators of compromise, output of analyses, and regular educational offerings. In return, we receive invaluable insight into threats in the wild and have the chance to help increase security around the globe.

Relativity Security: Proactive Alliances - Photo
Relativity Security: Information Technology and Information Sharing and Analysis Center - Logo

Information Technology and Information Sharing and Analysis Center

A forum for managing risks and strengthening IT infrastructure through cyber-information sharing and analysis.

Relativity Security: Mitre Attack - Logo

Mitre Attack

An adversary behavior framework that helps us understand risks, plan, verify defense, and help the community take a proactive defensive stance.

Relativity Security: Open Web Application Security Project - Logo

Open Web Application Security Project

An organization that provides unbiased and practical cost-effective information about computer and internet applications.

Relativity Security: Cloud Security Alliance - Logo

Cloud Security Alliance

A not-for-profit organization that promotes best practices for securely operating in a cloud environment.

Relativity Security: ILS-ISAO - Logo

LS-ISAO

A member-driven community that shares actionable cyberthreat and systems vulnerability information among law firms for their mutual defense.

Stay One Step Ahead: Threat Landscape Updates

Join the Relativity Community for access to Calder7’s weekly intelligence briefs, detailing the latest cybersecurity threats and how to guard against them.