
Your First SOAR Use Case: Phishing Triage
Phishing continues to be a dangerously effective attack method. Roughly 91% of successful attacks start with phishing. On average, 30% of the phishing emails sent get opened and viewed. Considering the minuscule cost and effort involved in creating and sending an email, it is no wonder this method continues to ... Read More

Your First SOAR Use Case: Phishing Triage
Phishing continues to be a dangerously effective attack method. Roughly 91% of successful attacks start with phishing. On average, 30% of the phishing emails sent get opened and viewed. Considering the minuscule cost and effort involved in creating and sending an email, it is no wonder this method continues to ... Read More
Reducing Response Times with SOAR-Integrated Threat Intelligence
The longer it takes to respond to a security-related event, the more damage that event is likely to cause. Key to reducing such damage—and the amount of dwell time—is being able to quickly determine the level of risk associated with the indicators of compromise (IOCs). One of the fastest ways ... Read More
Reducing Response Times with SOAR-Integrated Threat Intelligence
The longer it takes to respond to a security-related event, the more damage that event is likely to cause. Key to reducing such damage—and the amount of dwell time—is being able to quickly determine the level of risk associated with the indicators of compromise (IOCs). One of the fastest ways ... Read More
How SOAR Can Revolutionize Fraud Detection and Investigation
Detecting and investigating internal and external fraud in your organization can prove to be very difficult. Fraud detection generally occurs after the fraudulent action has already taken place, and in the case of financial institutions, after a customer has called and complained their account is missing assets. The scenario leaves ... Read More
How SOAR Can Revolutionize Fraud Detection and Investigation
Detecting and investigating internal and external fraud in your organization can prove to be very difficult. Fraud detection generally occurs after the fraudulent action has already taken place, and in the case of financial institutions, after a customer has called and complained their account is missing assets. The scenario leaves ... Read More
Swimlane Trial Launches with McAfee's MVISION Marketplace Opening
In working with Swimlane the last four or five years, McAfee is no stranger to Swimlane’s SOAR (Security Orchestration, Automation and Response) platform. We are excited to announce that Swimlane has been selected as one of the inaugural offerings in the new McAfee MVISION Marketplace. As a McAfee Security Integration ... Read More
Swimlane Trial Launches with McAfee's MVISION Marketplace Opening
In working with Swimlane the last four or five years, McAfee is no stranger to Swimlane’s SOAR (Security Orchestration, Automation and Response) platform. We are excited to announce that Swimlane has been selected as one of the inaugural offerings in the new McAfee MVISION Marketplace. As a McAfee Security Integration ... Read More

VPN Status Monitoring & Workflow Automation with SOAR
With so many users currently working outside the office, it is more important now than ever to monitor your organization’s remote-access and other VPNs. Dedicating one or more staff members to the task of VPN monitoring—using multiple tools in multiple windows and browser tabs—is inefficient and a difficult way to ... Read More

VPN Status Monitoring & Workflow Automation with SOAR
With so many users currently working outside the office, it is more important now than ever to monitor your organization’s remote-access and other VPNs. Dedicating one or more staff members to the task of VPN monitoring—using multiple tools in multiple windows and browser tabs—is inefficient and a difficult way to ... Read More