Your First SOAR Use Case: Phishing Triage

Your First SOAR Use Case: Phishing Triage

| | Phishing, use case, Use Cases
Phishing continues to be a dangerously effective attack method. Roughly 91% of successful attacks start with phishing. On average, 30% of the phishing emails sent get opened and viewed. Considering the minuscule cost and effort involved in creating and sending an email, it is no wonder this method continues to ... Read More

Reducing Response Times with SOAR-Integrated Threat Intelligence

| | Best Practices
The longer it takes to respond to a security-related event, the more damage that event is likely to cause. Key to reducing such damage—and the amount of dwell time—is being able to quickly determine the level of risk associated with the indicators of compromise (IOCs). One of the fastest ways ... Read More

How SOAR Can Revolutionize Fraud Detection and Investigation

| | security operations
Detecting and investigating internal and external fraud in your organization can prove to be very difficult. Fraud detection generally occurs after the fraudulent action has already taken place, and in the case of financial institutions, after a customer has called and complained their account is missing assets. The scenario leaves ... Read More

Swimlane Trial Launches with McAfee's MVISION Marketplace Opening

In working with Swimlane the last four or five years, McAfee is no stranger to Swimlane’s SOAR (Security Orchestration, Automation and Response) platform. We are excited to announce that Swimlane has been selected as one of the inaugural offerings in the new McAfee MVISION Marketplace. As a McAfee Security Integration ... Read More
Automated VPN Status Monitoring with SOAR

Automated VPN Status Monitoring with SOAR

| | Use Cases
With so many users currently working outside the office, it is more important now than ever to monitor your organization’s remote-access and other VPNs. Dedicating one or more staff members to the task of monitoring—using multiple tools in multiple windows and browser tabs—is inefficient and a difficult way to accomplish ... Read More
VPN Status Monitoring & Workflow Automation with SOAR

VPN Status Monitoring & Workflow Automation with SOAR

| | Use Cases
With so many users currently working outside the office, it is more important now than ever to monitor your organization’s remote-access and other VPNs. Dedicating one or more staff members to the task of VPN monitoring—using multiple tools in multiple windows and browser tabs—is inefficient and a difficult way to ... Read More

The Future of SOAR

| | security operations
In parts one and two of this blog series, we explored the state of the security operations center (SOC) with a focus on security information and event management (SIEM) systems and the state of security orchestration, automation and response (SOAR). In the third and final part of this series, we ... Read More

State of SOAR

The challenges discussed in Part 1 of this series explain why security operations centers (SOCs) require a security orchestration, automation and response (SOAR) solution for survival. Industry-wide, analysts are overwhelmed, overworked and in desperate need of tools designed to help them keep pace with today's expanding threat landscape and growing ... Read More

Swimlane SOAR Platform Gets Big Performance Boost Reducing MTTD and MTTR

| | News and Events
Setting new performance benchmarks for SOAR We're excited to announce the newest release of Swimlane! Swimlane users will see up to 35X performance improvement in alarm ingestion rates and up to a 60X improvement in search query response and display rates. Both achievements set new benchmarks for security orchestration, automation ... Read More

The Past, Present and Future of SOAR: Current State of the SOC

| | security operations
Security operations centers (SOCs) need to be able to respond to any kind of alert, attack or incident quickly and effectively while running lean teams and proving ROI to their executives. Accomplishing this requires highly skilled and trained personnel, well-documented processes and finely-tuned technologies. Unfortunately, not many SOCs are blessed ... Read More